syzbot


INFO: task hung in _vm_unmap_aliases (3)

Status: upstream: reported C repro on 2024/01/09 18:18
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+fe8f8efd070d727de971@syzkaller.appspotmail.com
First crash: 633d, last: 1d02h
Discussions (4)
Title Replies (including bot) Last reply
[syzbot] Monthly mm report (Dec 2024) 0 (1) 2024/12/05 09:04
[syzbot] Monthly mm report (Oct 2024) 0 (1) 2024/10/03 09:02
[syzbot] Monthly mm report (Sep 2024) 0 (1) 2024/09/02 08:17
[syzbot] [modules?] INFO: task hung in _vm_unmap_aliases (3) 0 (1) 2024/01/09 18:18
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in _vm_unmap_aliases kernel 1 1773d 1773d 0/29 auto-closed as invalid on 2020/11/17 05:59
linux-5.15 INFO: task hung in _vm_unmap_aliases 1 223d 223d 0/3 auto-obsoleted due to no activity on 2025/02/23 10:14
upstream INFO: task hung in _vm_unmap_aliases (2) modules 1 923d 923d 0/29 auto-obsoleted due to no activity on 2023/04/08 08:01
Last patch testing requests (10)
Created Duration User Patch Repo Result
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 1h08m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 18:53 33m retest repro upstream error
2025/04/28 18:53 1h08m retest repro upstream error
2025/04/28 18:53 1h48m retest repro upstream error
2025/04/28 16:59 1h39m retest repro upstream error
2025/04/28 16:22 33m retest repro upstream error

Sample crash report:
INFO: task kworker/0:1:10 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1     state:D stack:0     pid:10    tgid:10    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:8323ec00
 r4:8323ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8323ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b600
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb703000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8576338c r4:85763000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8576338c r4:830b8500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8323ec00 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60
 r4:830b8500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830b8500 r8:8027ed34 r7:df83de60 r6:830b8600 r5:8323ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf841fb0 to 0xdf841ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:830b6180
INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/1:1:43 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1     state:D stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df911d84 r8:00000002 r7:60000113 r6:df911d8c r5:83308000
 r4:83308000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83308000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
INFO: task kworker/1:1:43 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/0:2:2863 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:2     state:D stack:0     pid:2863  tgid:2863  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ebaa9d84 r8:00000002 r7:60000013 r6:ebaa9d8c r5:83b1e000
 r4:83b1e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83b1e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b7c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83b1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7a7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85763b8c r4:85763800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85763b8c r4:8434ce80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83b1e000 r8:8434ceac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8434ce80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8434ce80 r8:8027ed34 r7:df83de60 r6:845c2b80 r5:83b1e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa9fb0 to 0xebaa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8427e540
INFO: task kworker/0:2:2863 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/0:0:3079 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:0     state:D stack:0     pid:3079  tgid:3079  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df979d84 r8:00000002 r7:60000013 r6:df979d8c r5:841ac800
 r4:841ac800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:841ac800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179cc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:841ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9bf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513e38c r4:8513e000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8513e38c r4:848d4480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:841ac800 r8:848d44ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4480 r8:8027ed34 r7:ebaa9e60 r6:8424fc80 r5:841ac800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf979fb0 to 0xdf979ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84288840
INFO: task kworker/0:0:3079 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/1:4:3100 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:4     state:D stack:0     pid:3100  tgid:3100  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9b1d84 r8:00000002 r7:60000013 r6:df9b1d8c r5:838b5400
 r4:838b5400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:838b5400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:838b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb73000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b27f8c r4:84b27c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b27f8c r4:8424f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:838b5400 r8:8424f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424f180 r8:8027ed34 r7:df911e60 r6:8424f200 r5:838b5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9b1fb0 to 0xdf9b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846e2ac0
INFO: task kworker/1:4:3100 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/1:5:3104 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:5     state:D stack:0     pid:3104  tgid:3104  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df96dd84 r8:00000002 r7:60000113 r6:df96dd8c r5:8324a400
 r4:8324a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8324a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7980
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcbf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9e78c r4:84b9e400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9e78c r4:8424f500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8324a400 r8:8424f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424f500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424f500 r8:8027ed34 r7:df9b1e60 r6:8424f300 r5:8324a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf96dfb0 to 0xdf96dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84607500
INFO: task kworker/1:5:3104 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/1:6:3105 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:6     state:D stack:0     pid:3105  tgid:3105  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9c9d84 r8:00000002 r7:60000113 r6:df9c9d8c r5:841a8c00
 r4:841a8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:841a8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf80c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:841a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb1b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9f78c r4:84b9f400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9f78c r4:8424f480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:841a8c00 r8:8424f4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424f480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424f480 r8:8027ed34 r7:df96de60 r6:8424f580 r5:841a8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c9fb0 to 0xdf9c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84607500
INFO: task kworker/1:6:3105 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/1:7:3107 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:7     state:D stack:0     pid:3107  tgid:3107  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:832d8000
 r4:832d8000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832d8000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526afc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:832d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfceb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8529078c r4:85290400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8529078c r4:8424f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832d8000 r8:8424f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424f600 r8:8027ed34 r7:df9c9e60 r6:8424f780 r5:832d8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d5fb0 to 0xdf9d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84617740
INFO: task kworker/1:7:3107 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/1:8:3108 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:8     state:D stack:0     pid:3108  tgid:3108  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9a9d84 r8:00000002 r7:60000113 r6:df9a9d8c r5:84150c00
 r4:84150c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84150c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851729c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84150c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9d7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85134f8c r4:85134c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85134f8c r4:8424f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84150c00 r8:8424f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424f800 r8:8027ed34 r7:df9d5e60 r6:8424f880 r5:84150c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9a9fb0 to 0xdf9a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8461dd80
INFO: task kworker/1:8:3108 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/0:3:3111 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:3     state:D stack:0     pid:3111  tgid:3111  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:83b1d400
 r4:83b1d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83b1d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b3c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83b1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb565000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85762b8c r4:85762800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85762b8c r4:848d4500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83b1d400 r8:848d452c r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4500 r8:8027ed34 r7:ebaa9e60 r6:8424f900 r5:83b1d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa05fb0 to 0xdfa05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84947d00
INFO: task kworker/0:3:3111 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:9:3113 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:9     state:D stack:0     pid:3113  tgid:3113  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:84156c00
 r4:84156c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84156c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2d00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84156c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e054b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513ff8c r4:8513fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513ff8c r4:8424f980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84156c00 r8:8424f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424f980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424f980 r8:8027ed34 r7:df9d5e60 r6:8424fe00 r5:84156c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa09fb0 to 0xdfa09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846d0540
INFO: task kworker/1:9:3113 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:10:3115 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:10    state:D stack:0     pid:3115  tgid:3115  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83b19800
 r4:83b19800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83b19800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ef040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83b19800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab15000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f3f8c r4:842f3c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f3f8c r4:8424fd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83b19800 r8:8424fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424fd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424fd80 r8:8027ed34 r7:df9d5e60 r6:8424fd00 r5:83b19800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa19fb0 to 0xdfa19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d00c0
INFO: task kworker/1:10:3115 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:11:3117 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:11    state:D stack:0     pid:3117  tgid:3117  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84503000
 r4:84503000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84503000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ddd00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84503000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9b9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85291f8c r4:85291c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85291f8c r4:8424fc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84503000 r8:8424fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424fc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424fc00 r8:8027ed34 r7:dfa19e60 r6:8424fb00 r5:84503000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f5fb0 to 0xdf9f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0340
INFO: task kworker/1:11:3117 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ddf97000 df9a1000 00000001 80239bb8 7f17b000 00000001 82abe1c4 82abd5a0
5d40: 7f17b000 df9a1000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1fb8c r4:84b1f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b1fb8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:12:3119 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:12    state:D stack:0     pid:3119  tgid:3119  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:84501800
 r4:84501800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84501800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a36880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84501800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0729000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852c8b8c r4:852c8800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852c8b8c r4:8424fa00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84501800 r8:8424fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424fa00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424fa00 r8:8027ed34 r7:dfa19e60 r6:8424ff80 r5:84501800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e1fb0 to 0xdf9e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0340
INFO: task kworker/1:12:3119 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 7f540000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 900d0113 ffffffff
 r5:900d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:13:3121 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:13    state:D stack:0     pid:3121  tgid:3121  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:84500c00
 r4:84500c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84500c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa4400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84500c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05c5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f0b8c r4:842f0800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f0b8c r4:8424ff00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84500c00 r8:8424ff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8424ff00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8424ff00 r8:8027ed34 r7:df9e1e60 r6:8424fe80 r5:84500c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa2dfb0 to 0xdfa2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d06c0
INFO: task kworker/1:13:3121 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 7f819000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 900d0113 ffffffff
 r5:900d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:14:3123 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:14    state:D stack:0     pid:3123  tgid:3123  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:84506000
 r4:84506000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84506000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a9c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84506000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff8f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852cbf8c r4:852cbc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852cbf8c r4:83bd2180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84506000 r8:83bd21ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:83bd2180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:83bd2180 r8:8027ed34 r7:df9e1e60 r6:83bd2100 r5:84506000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa39fb0 to 0xdfa39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0840
INFO: task kworker/1:14:3123 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 7fac9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 900d0113 ffffffff
 r5:900d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:15:3125 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:15    state:D stack:0     pid:3125  tgid:3125  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:84506c00
 r4:84506c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84506c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5fa40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84506c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852c9f8c r4:852c9c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852c9f8c r4:8329e000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84506c00 r8:8329e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8329e000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8329e000 r8:8027ed34 r7:dfa39e60 r6:830cd100 r5:84506c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa45fb0 to 0xdfa45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0880
INFO: task kworker/1:15:3125 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 7fe4f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 900d0113 ffffffff
 r5:900d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:16:3127 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:16    state:D stack:0     pid:3127  tgid:3127  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:84500000
 r4:84500000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84500000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ea00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84500000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc91000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551b78c r4:8551b400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8551b78c r4:830cd380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84500000 r8:830cd3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:830cd380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cd380 r8:8027ed34 r7:dfa39e60 r6:830cd080 r5:84500000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa5dfb0 to 0xdfa5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0a00
INFO: task kworker/1:16:3127 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8006d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:17:3129 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:17    state:D stack:0     pid:3129  tgid:3129  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:84504800
 r4:84504800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84504800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba3c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84504800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0085000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854dc78c r4:854dc400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:854dc78c r4:833ccd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84504800 r8:833ccdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833ccd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833ccd80 r8:8027ed34 r7:dfa5de60 r6:833cce00 r5:84504800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa51fb0 to 0xdfa51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0d00
INFO: task kworker/1:17:3129 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 801e1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:18:3132 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:18    state:D stack:0     pid:3132  tgid:3132  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:84502400
 r4:84502400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84502400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516da00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84502400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03f9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8497578c r4:84975400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8497578c r4:833b4f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84502400 r8:833b4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4f00 r8:8027ed34 r7:dfa5de60 r6:8423a780 r5:84502400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa69fb0 to 0xdfa69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0f80
INFO: task kworker/1:18:3132 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 80517000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:19:3133 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:19    state:D stack:0     pid:3133  tgid:3133  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:84503c00
 r4:84503c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84503c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dfbc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84503c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5bf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8564af8c r4:8564ac00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8564af8c r4:8423a700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84503c00 r8:8423a72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8423a700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8423a700 r8:8027ed34 r7:dfa69e60 r6:84958000 r5:84503c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa75fb0 to 0xdfa75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d0f80
INFO: task kworker/1:19:3133 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 807d5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:20:3134 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:20    state:D stack:0     pid:3134  tgid:3134  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83acec00
 r4:83acec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83acec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855de780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83acec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb465000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8554878c r4:85548400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8554878c r4:84958080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83acec00 r8:849580ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958080 r8:8027ed34 r7:dfa75e60 r6:84958100 r5:83acec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa81fb0 to 0xdfa81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955040
INFO: task kworker/1:20:3134 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 809c9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:21:3137 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:21    state:D stack:0     pid:3137  tgid:3137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83aca400
 r4:83aca400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83aca400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85388740
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3a5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85592f8c r4:85592c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85592f8c r4:84958180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83aca400 r8:849581ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958180 r8:8027ed34 r7:dfa75e60 r6:84958200 r5:83aca400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa8dfb0 to 0xdfa8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955180
INFO: task kworker/1:21:3137 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 80d18000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:22:3139 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:22    state:D stack:0     pid:3139  tgid:3139  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83ac8c00
 r4:83ac8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83ac8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852764c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6d7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8559138c r4:85591000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8559138c r4:84958280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83ac8c00 r8:849582ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958280 r8:8027ed34 r7:dfa8de60 r6:84958300 r5:83ac8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa99fb0 to 0xdfa99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:849552c0
INFO: task kworker/1:22:3139 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 80f1d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:23:3141 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:23    state:D stack:0     pid:3141  tgid:3141  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83acbc00
 r4:83acbc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83acbc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b59fc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6e3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84976f8c r4:84976c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84976f8c r4:84958380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83acbc00 r8:849583ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958380 r8:8027ed34 r7:dfa8de60 r6:84958400 r5:83acbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa5fb0 to 0xdfaa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955340
INFO: task kworker/1:23:3141 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 812ea000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:24:3142 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:24    state:D stack:0     pid:3142  tgid:3142  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83acd400
 r4:83acd400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83acd400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85708980
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4c5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85593b8c r4:85593800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85593b8c r4:84958480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83acd400 r8:849584ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958480 r8:8027ed34 r7:dfaa5e60 r6:84958500 r5:83acd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab1fb0 to 0xdfab1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955340
INFO: task kworker/1:24:3142 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 81663000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:25:3145 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:25    state:D stack:0     pid:3145  tgid:3145  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83acc800
 r4:83acc800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83acc800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d7cc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab31000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84977b8c r4:84977800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84977b8c r4:84958580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83acc800 r8:849585ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958580 r8:8027ed34 r7:dfaa5e60 r6:84958600 r5:83acc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfabdfb0 to 0xdfabdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955840
INFO: task kworker/1:25:3145 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 818ac000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:26:3146 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:26    state:D stack:0     pid:3146  tgid:3146  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:83acb000
 r4:83acb000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83acb000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83acb000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb52f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8576278c r4:85762400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8576278c r4:84958680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83acb000 r8:849586ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958680 r8:8027ed34 r7:dfabde60 r6:84958700 r5:83acb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfacdfb0 to 0xdfacdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955780
INFO: task kworker/1:26:3146 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 81df6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:27:3149 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:27    state:D stack:0     pid:3149  tgid:3149  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83ac9800
 r4:83ac9800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83ac9800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b64c40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebaa1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857e4f8c r4:857e4c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:857e4f8c r4:84958780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83ac9800 r8:849587ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958780 r8:8027ed34 r7:dfabde60 r6:84958800 r5:83ac9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfac9fb0 to 0xdfac9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955bc0
INFO: task kworker/1:27:3149 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 820aa000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:28:3151 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:28    state:D stack:0     pid:3151  tgid:3151  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83fb6000
 r4:83fb6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fb6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba41000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84977f8c r4:84977c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84977f8c r4:84958900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb6000 r8:8495892c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958900 r8:8027ed34 r7:dfabde60 r6:84958980 r5:83fb6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfae5fb0 to 0xdfae5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955c00
INFO: task kworker/1:28:3151 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 821ba000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:29:3153 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:29    state:D stack:0     pid:3153  tgid:3153  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83fb6c00
 r4:83fb6c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb6c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3f80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0653000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84974f8c r4:84974c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84974f8c r4:84958880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb6c00 r8:849588ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958880 r8:8027ed34 r7:dfae5e60 r6:84958a00 r5:83fb6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaf1fb0 to 0xdfaf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84955c00
INFO: task kworker/1:29:3153 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 826eb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:30:3155 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:30    state:D stack:0     pid:3155  tgid:3155  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83fb0c00
 r4:83fb0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2d40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fb0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00c7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:856e138c r4:856e1000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:856e138c r4:84958a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb0c00 r8:84958aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958a80 r8:8027ed34 r7:dfaf1e60 r6:84958b00 r5:83fb0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfafdfb0 to 0xdfafdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8496b200
INFO: task kworker/1:30:3155 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 82835000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:31:3157 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:31    state:D stack:0     pid:3157  tgid:3157  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:83fb4800
 r4:83fb4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cd800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f19b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9a3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8590db8c r4:8590d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8590db8c r4:84958c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb4800 r8:84958c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958c00 r8:8027ed34 r7:dfafde60 r6:84958c80 r5:83fb4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfad9fb0 to 0xdfad9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8496b100
INFO: task kworker/1:31:3157 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 82a57000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:32:3158 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:32    state:D stack:0     pid:3158  tgid:3158  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83fb3c00
 r4:83fb3c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb3c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b1880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fb3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f187000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecac9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8590d78c r4:8590d400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8590d78c r4:84958d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb3c00 r8:84958d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958d00 r8:8027ed34 r7:dfad9e60 r6:84958d80 r5:83fb3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb15fb0 to 0xdfb15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8496b100
INFO: task kworker/1:32:3158 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 83320000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:4:3160 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:4     state:D stack:0     pid:3160  tgid:3160  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83fb1800
 r4:83fb1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b480
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83fb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb58f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85762f8c r4:85762c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85762f8c r4:848d4300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb1800 r8:848d432c r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4300 r8:8027ed34 r7:ebaa9e60 r6:84958e00 r5:83fb1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb2dfb0 to 0xdfb2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8494ad40
INFO: task kworker/0:4:3160 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 834bc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:5:3166 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:5     state:D stack:0     pid:3166  tgid:3166  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83fb0000
 r4:83fb0000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb0000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bc00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83fb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb891000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857dcb8c r4:857dc800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857dcb8c r4:848d4580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb0000 r8:848d45ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4580 r8:8027ed34 r7:ebaa9e60 r6:84958e80 r5:83fb0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb4dfb0 to 0xdfb4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8494afc0
INFO: task kworker/0:5:3166 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8364d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:6:3167 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6     state:D stack:0     pid:3167  tgid:3167  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83896c00
 r4:83896c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83896c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b8c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83896c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7d5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85763f8c r4:85763c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85763f8c r4:848d4600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83896c00 r8:848d462c r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4600 r8:8027ed34 r7:dfb4de60 r6:84958f00 r5:83896c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb59fb0 to 0xdfb59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8494acc0
INFO: task kworker/0:6:3167 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 837f5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:33:3168 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:33    state:D stack:0     pid:3168  tgid:3168  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:841a6000
 r4:841a6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:841a6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849329c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:841a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f297000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec439000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85a0378c r4:85a03400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85a0378c r4:84958f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:841a6000 r8:84958fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84958f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84958f80 r8:8027ed34 r7:dfad9e60 r6:84967000 r5:841a6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb5dfb0 to 0xdfb5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8496bc00
INFO: task kworker/1:33:3168 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 838d3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:7:3169 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:7     state:D stack:0     pid:3169  tgid:3169  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:841a0000
 r4:841a0000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:841a0000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b9c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:841a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb805000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857dc38c r4:857dc000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857dc38c r4:848d4680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:841a0000 r8:848d46ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4680 r8:8027ed34 r7:dfb4de60 r6:84967080 r5:841a0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb61fb0 to 0xdfb61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8494a900
INFO: task kworker/0:7:3169 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 83c80000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:34:3171 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:34    state:D stack:0     pid:3171  tgid:3171  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:841a3000
 r4:841a3000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:841a3000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362a80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:841a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb33000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8470478c r4:84704400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8470478c r4:84967100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:841a3000 r8:8496712c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967100 r8:8027ed34 r7:dfb5de60 r6:84967180 r5:841a3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb69fb0 to 0xdfb69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8496bdc0
INFO: task kworker/1:34:3171 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 83ef6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:8:3174 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:8     state:D stack:0     pid:3174  tgid:3174  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:841a2400
 r4:841a2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:841a2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ffc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:841a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec3d5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857de38c r4:857de000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857de38c r4:848d4700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:841a2400 r8:848d472c r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4700 r8:8027ed34 r7:dfb4de60 r6:84967200 r5:841a2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb79fb0 to 0xdfb79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8494a640
INFO: task kworker/0:8:3174 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 841c2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:9:3175 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:9     state:D stack:0     pid:3175  tgid:3175  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:83308c00
 r4:83308c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83308c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bdc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb99d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857dd38c r4:857dd000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857dd38c r4:848d4780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308c00 r8:848d47ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4780 r8:8027ed34 r7:dfb79e60 r6:84967280 r5:83308c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb85fb0 to 0xdfb85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84277000
INFO: task kworker/0:9:3175 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 845a9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:10:3178 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10    state:D stack:0     pid:3178  tgid:3178  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:83fbe000
 r4:83fbe000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fbe000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83fbe000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec389000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857dd78c r4:857dd400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857dd78c r4:848d4800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fbe000 r8:848d482c r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4800 r8:8027ed34 r7:dfb79e60 r6:84967300 r5:83fbe000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb09fb0 to 0xdfb09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84277000
INFO: task kworker/0:10:3178 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 845a9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:35:3179 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:35    state:D stack:0     pid:3179  tgid:3179  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:83fb8c00
 r4:83fb8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539a640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fb8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f35d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecf5b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85a99b8c r4:85a99800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85a99b8c r4:84967380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb8c00 r8:849673ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967380 r8:8027ed34 r7:dfb5de60 r6:84967400 r5:83fb8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb21fb0 to 0xdfb21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8496ba80
INFO: task kworker/1:35:3179 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 849a2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:36:3181 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:36    state:D stack:0     pid:3181  tgid:3181  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb99d84 r8:00000002 r7:60000013 r6:dfb99d8c r5:83fba400
 r4:83fba400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fba400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fba400 r7:00000000 r6:83018200 r5:00001000 r4:7f2a7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec3a7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85a9df8c r4:85a9dc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85a9df8c r4:84967480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fba400 r8:849674ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967480 r8:8027ed34 r7:dfb21e60 r6:84967500 r5:83fba400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb99fb0 to 0xdfb99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d3f80
INFO: task kworker/1:36:3181 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8509b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:11:3187 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:11    state:D stack:0     pid:3187  tgid:3187  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83fb9800
 r4:83fb9800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb9800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83fb9800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec3a1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857ddb8c r4:857dd800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857ddb8c r4:848d4880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb9800 r8:848d48ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4880 r8:8027ed34 r7:dfb79e60 r6:84967680 r5:83fb9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbcdfb0 to 0xdfbcdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:842775c0
INFO: task kworker/0:11:3187 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 85521000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:12:3189 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12    state:D stack:0     pid:3189  tgid:3189  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:83fbec00
 r4:83fbec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fbec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83fbec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa65000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857def8c r4:857dec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857def8c r4:848d4900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fbec00 r8:848d492c r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4900 r8:8027ed34 r7:dfb79e60 r6:84967700 r5:83fbec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbddfb0 to 0xdfbddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84277840
INFO: task kworker/0:12:3189 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 85664000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:13:3190 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13    state:D stack:0     pid:3190  tgid:3190  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbe1d84 r8:00000002 r7:60000013 r6:dfbe1d8c r5:83fbbc00
 r4:83fbbc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fbbc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83fbbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec43f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857deb8c r4:857de800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857deb8c r4:848d4980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fbbc00 r8:848d49ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4980 r8:8027ed34 r7:dfbdde60 r6:84967780 r5:83fbbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbe1fb0 to 0xdfbe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84277780
INFO: task kworker/0:13:3190 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 858ef000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:38:3192 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:38    state:D stack:0     pid:3192  tgid:3192  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:84194800
 r4:84194800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84194800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85609cc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84194800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfba1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85b75b8c r4:85b75800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85b75b8c r4:84967800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84194800 r8:8496782c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967800 r8:8027ed34 r7:dfba5e60 r6:84967880 r5:84194800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbf1fb0 to 0xdfbf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:849726c0
INFO: task kworker/1:38:3192 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 85b8c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:14:3194 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14    state:D stack:0     pid:3194  tgid:3194  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83fb8000
 r4:83fb8000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fb8000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1500
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:83fb8000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff27000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857df38c r4:857df000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857df38c r4:848d4a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fb8000 r8:848d4a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:848d4a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848d4a00 r8:8027ed34 r7:dfbdde60 r6:84967900 r5:83fb8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbb1fb0 to 0xdfbb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84277880
INFO: task kworker/0:14:3194 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 85f32000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:39:3195 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:39    state:D stack:0     pid:3195  tgid:3195  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:83fbd400
 r4:83fbd400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83fbd400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853834c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83fbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f461000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed4df000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85ba3b8c r4:85ba3800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85ba3b8c r4:84967980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83fbd400 r8:849679ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967980 r8:8027ed34 r7:dfba5e60 r6:84967a00 r5:83fbd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc01fb0 to 0xdfc01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:849726c0
INFO: task kworker/1:39:3195 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 860c4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:40:3197 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:40    state:D stack:0     pid:3197  tgid:3197  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:83b01800
 r4:83b01800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83b01800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972a40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f429000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec817000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85c58b8c r4:85c58800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85c58b8c r4:84967a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83b01800 r8:84967aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967a80 r8:8027ed34 r7:dfba5e60 r6:84967b00 r5:83b01800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc0dfb0 to 0xdfc0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84972b40
INFO: task kworker/1:40:3197 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 86717000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:41:3199 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:41    state:D stack:0     pid:3199  tgid:3199  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83af8000
 r4:83af8000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83af8000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83af8000 r7:00000000 r6:83018200 r5:00001000 r4:7f4ed000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed65f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85c58f8c r4:85c58c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85c58f8c r4:84967b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83af8000 r8:84967bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967b80 r8:8027ed34 r7:dfba5e60 r6:84967c00 r5:83af8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbd9fb0 to 0xdfbd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84972a80
INFO: task kworker/1:41:3199 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 86a2d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:42:3201 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:42    state:D stack:0     pid:3201  tgid:3201  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000013 r6:dfbbdd8c r5:83af8c00
 r4:83af8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83af8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b53680
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83af8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4db000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec8d1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85c5938c r4:85c59000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85c5938c r4:84967c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83af8c00 r8:84967cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84967c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84967c80 r8:8027ed34 r7:dfba5e60 r6:84967d00 r5:83af8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbbdfb0 to 0xdfbbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84972a80
INFO: task kworker/1:42:3201 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 86ce3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:73:3423 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:73    state:D stack:0     pid:3423  tgid:3423  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfd71d84 r8:00000002 r7:60000113 r6:dfd71d8c r5:84ad8c00
 r4:84ad8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ad8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcd0c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84ad8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbc3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a7ff8c r4:84a7fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a7ff8c r4:84921480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ad8c00 r8:849214ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84921480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84921480 r8:8027ed34 r7:dfd65e60 r6:84921500 r5:84ad8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfd71fb0 to 0xdfd71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8491b400
INFO: task kworker/1:73:3423 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 87159000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:76:3491 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:76    state:D stack:0     pid:3491  tgid:3491  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dff81d84 r8:00000002 r7:60000113 r6:dff81d8c r5:84ae3c00
 r4:84ae3c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ae3c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff81e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84ae3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa25000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1ff8c r4:84b1fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1ff8c r4:84921d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ae3c00 r8:84921dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84921d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84921d80 r8:8027ed34 r7:dfd71e60 r6:84921e00 r5:84ae3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff81fb0 to 0xdff81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b43dc0
INFO: task kworker/1:76:3491 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 87590000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:131:3509 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:131   state:D stack:0     pid:3509  tgid:3509  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dffe1d84 r8:00000002 r7:60000113 r6:dffe1d8c r5:84aebc00
 r4:84aebc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84aebc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b489c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84aebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaa9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2078c r4:84b20400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2078c r4:84b4a600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84aebc00 r8:84b4a62c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a600 r8:8027ed34 r7:dffd5e60 r6:84b58080 r5:84aebc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b484c0
INFO: task kworker/0:131:3509 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 87590000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:132:3510 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:132   state:D stack:0     pid:3510  tgid:3510  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dffe5d84 r8:00000002 r7:60000013 r6:dffe5d8c r5:84ae8c00
 r4:84ae8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ae8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b488c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ae8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa79000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2038c r4:84b20000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2038c r4:84b4a680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ae8c00 r8:84b4a6ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a680 r8:8027ed34 r7:dffe1e60 r6:84b58100 r5:84ae8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe5fb0 to 0xdffe5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b484c0
INFO: task kworker/0:132:3510 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 87b26000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:77:3512 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:77    state:D stack:0     pid:3512  tgid:3512  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:84aec800
 r4:84aec800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84aec800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55600
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84aec800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa4d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a7f38c r4:84a7f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a7f38c r4:84b58180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84aec800 r8:84b581ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b58180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b58180 r8:8027ed34 r7:dfd71e60 r6:84b58200 r5:84aec800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffddfb0 to 0xdffddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b55540
INFO: task kworker/1:77:3512 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 87ee0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:78:3514 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:78    state:D stack:0     pid:3514  tgid:3514  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:84aed400
 r4:84aed400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84aed400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55a80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84aed400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb03000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a7f78c r4:84a7f400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a7f78c r4:84b58280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84aed400 r8:84b582ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b58280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b58280 r8:8027ed34 r7:dfd71e60 r6:84b58300 r5:84aed400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff2dfb0 to 0xdff2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b55480
INFO: task kworker/1:78:3514 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 87fd5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:133:3517 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:133   state:D stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dffedd84 r8:00000002 r7:60000013 r6:dffedd8c r5:84aeec00
 r4:84aeec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84aeec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48ac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84aeec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfad1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b20b8c r4:84b20800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b20b8c r4:84b4a700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84aeec00 r8:84b4a72c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a700 r8:8027ed34 r7:dffe1e60 r6:84b58380 r5:84aeec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffedfb0 to 0xdffedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b487c0
INFO: task kworker/0:133:3517 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8828a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:134:3518 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:134   state:D stack:0     pid:3518  tgid:3518  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfff1d84 r8:00000002 r7:60000013 r6:dfff1d8c r5:84aea400
 r4:84aea400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84aea400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48cc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84aea400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb37000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b20f8c r4:84b20c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b20f8c r4:84b4a780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84aea400 r8:84b4a7ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a780 r8:8027ed34 r7:dffede60 r6:84b58400 r5:84aea400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfff1fb0 to 0xdfff1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48840
INFO: task kworker/0:134:3518 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 888ab000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:135:3522 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:135   state:D stack:0     pid:3522  tgid:3522  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84ae6c00
 r4:84ae6c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ae6c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48f80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd61000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2178c r4:84b21400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2178c r4:84b4a800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ae6c00 r8:84b4a82c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a800 r8:8027ed34 r7:dfff1e60 r6:84b58480 r5:84ae6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfff5fb0 to 0xdfff5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48b40
INFO: task kworker/0:135:3522 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 88a0d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:79:3524 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:79    state:D stack:0     pid:3524  tgid:3524  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfff9d84 r8:00000002 r7:60000113 r6:dfff9d8c r5:84ae6000
 r4:84ae6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ae6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ee40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfba9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a7fb8c r4:84a7f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a7fb8c r4:84b58500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ae6000 r8:84b5852c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b58500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b58500 r8:8027ed34 r7:dfd71e60 r6:84b58580 r5:84ae6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfff9fb0 to 0xdfff9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b55ac0
INFO: task kworker/1:79:3524 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 88f67000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:136:3525 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:136   state:D stack:0     pid:3525  tgid:3525  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfffdd84 r8:00000002 r7:60000013 r6:dfffdd8c r5:84af0000
 r4:84af0000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af0000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfffde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd25000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2138c r4:84b21000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2138c r4:84b4a880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af0000 r8:84b4a8ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a880 r8:8027ed34 r7:dfff5e60 r6:84b58600 r5:84af0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfffdfb0 to 0xdfffdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48bc0
INFO: task kworker/0:136:3525 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 88f67000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:137:3527 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:137   state:D stack:0     pid:3527  tgid:3527  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0005d84 r8:00000002 r7:60000113 r6:e0005d8c r5:84af1800
 r4:84af1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0005e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b485c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af1800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd95000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b21b8c r4:84b21800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b21b8c r4:84b4a900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af1800 r8:84b4a92c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a900 r8:8027ed34 r7:dfff5e60 r6:84b58680 r5:84af1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0005fb0 to 0xe0005ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48e00
INFO: task kworker/0:137:3527 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 89b84000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:138:3528 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:138   state:D stack:0     pid:3528  tgid:3528  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0009d84 r8:00000002 r7:60000013 r6:e0009d8c r5:84af2400
 r4:84af2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff53000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2378c r4:84b23400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2378c r4:84b4a980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af2400 r8:84b4a9ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a980 r8:8027ed34 r7:e0005e60 r6:84b58700 r5:84af2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0009fb0 to 0xe0009ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48ec0
INFO: task kworker/0:138:3528 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 89b84000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:139:3530 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:139   state:D stack:0     pid:3530  tgid:3530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0011d84 r8:00000002 r7:60000113 r6:e0011d8c r5:84af3c00
 r4:84af3c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af3c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2d00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdc5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b21f8c r4:84b21c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b21f8c r4:84b4aa00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af3c00 r8:84b4aa2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4aa00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4aa00 r8:8027ed34 r7:e0009e60 r6:84b58780 r5:84af3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0011fb0 to 0xe0011ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48f00
INFO: task kworker/0:139:3530 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 89e5c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:140:3532 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:140   state:D stack:0     pid:3532  tgid:3532  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0019d84 r8:00000002 r7:60000013 r6:e0019d8c r5:84af4800
 r4:84af4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0019e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af4800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdd7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2238c r4:84b22000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2238c r4:84b4aa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af4800 r8:84b4aaac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4aa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4aa80 r8:8027ed34 r7:e0009e60 r6:84b58800 r5:84af4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0019fb0 to 0xe0019ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846e2780
INFO: task kworker/0:140:3532 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8a4b9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:141:3534 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:141   state:D stack:0     pid:3534  tgid:3534  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0021d84 r8:00000002 r7:60000013 r6:e0021d8c r5:84af0c00
 r4:84af0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdfd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2278c r4:84b22400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2278c r4:84b4ab00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af0c00 r8:84b4ab2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4ab00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4ab00 r8:8027ed34 r7:e0009e60 r6:84b58880 r5:84af0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0021fb0 to 0xe0021ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5e1c0
INFO: task kworker/0:141:3534 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8aa4c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:142:3536 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:142   state:D stack:0     pid:3536  tgid:3536  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:84af6000
 r4:84af6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af6000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff0f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b22b8c r4:84b22800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b22b8c r4:84b4ab80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af6000 r8:84b4abac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4ab80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4ab80 r8:8027ed34 r7:e0009e60 r6:84b58900 r5:84af6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0029fb0 to 0xe0029ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5e100
INFO: task kworker/0:142:3536 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8aa4c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:143:3538 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:143   state:D stack:0     pid:3538  tgid:3538  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0031d84 r8:00000002 r7:60000113 r6:e0031d8c r5:84af5400
 r4:84af5400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af5400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0031e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff1d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b22f8c r4:84b22c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b22f8c r4:84b4ac00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af5400 r8:84b4ac2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4ac00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4ac00 r8:8027ed34 r7:e0009e60 r6:84b58980 r5:84af5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0031fb0 to 0xe0031ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5e200
INFO: task kworker/0:143:3538 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8aebc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:144:3540 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:144   state:D stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dffe9d84 r8:00000002 r7:60000013 r6:dffe9d8c r5:848ab000
 r4:848ab000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:848ab000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e680
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:848ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff3f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2338c r4:84b23000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2338c r4:84b4ac80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:848ab000 r8:84b4acac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4ac80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4ac80 r8:8027ed34 r7:e0009e60 r6:84b4ad00 r5:848ab000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe9fb0 to 0xdffe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5e3c0
INFO: task kworker/0:144:3540 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8b738000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
 r4:00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e980
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e003f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b23b8c r4:84b23800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b23b8c r4:84b4ad80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476b000 r8:84b4adac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4ad80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4ad80 r8:8027ed34 r7:e0009e60 r6:84b4ae00 r5:8476b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0035fb0 to 0xe0035ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5e600
INFO: task kworker/0:145:3543 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r4:82abe1e4
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:146:3545 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:146   state:D stack:0     pid:3545  tgid:3545  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0039d84 r8:00000002 r7:60000013 r6:e0039d8c r5:849c0c00
 r4:849c0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849c0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5eb40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0047000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b23f8c r4:84b23c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b23f8c r4:84b4ae80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c0c00 r8:84b4aeac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4ae80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5e780
INFO: task kworker/0:146:3545 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8bb9f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ecc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e004f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2438c r4:84b24000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2438c r4:84b4af80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c0000 r8:84b4afac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4af80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4af80 r8:8027ed34 r7:e0039e60 r6:84b6a000 r5:849c0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffc9fb0 to 0xdffc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/0:147:3547 is blocked on a mutex likely owned by task kworker/0:129:3505.
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0065e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5edc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e005b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2478c r4:84b24400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2478c r4:84b6a080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c2400 r8:84b6a0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a080 r8:8027ed34 r7:dffc9e60 r6:84b6a100 r5:849c2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0065fb0 to 0xe0065ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5eac0
INFO: task kworker/0:148:3549 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8c116000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:149   state:D stack:0     pid:3551  tgid:3551  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ef80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e006b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b24b8c r4:84b24800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b24b8c r4:84b6a180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c3000 r8:84b6a1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a180 r8:8027ed34 r7:e0065e60 r6:84b6a200 r5:849c3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0059fb0 to 0xe0059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5eec0
INFO: task kworker/0:149:3551 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8c620000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8587db8c r4:8587d800
 r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:150:3553 blocked for more than 453 seconds.
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0077000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b24f8c r4:84b24c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b24f8c r4:84b6a280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af8000 r8:84b6a2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a280 r8:8027ed34 r7:e0059e60 r6:84b58a00 r5:84af8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0081fb0 to 0xe0081ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b55cc0
INFO: task kworker/0:150:3553 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8c8ff000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r4:84b48100
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0091e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r5:00001000 r4:e00d7000
 r7:dddced40 r6:83018000 r5:84b2638c r4:84b6a300
1fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:152:3557 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:152   state:D stack:0     pid:3557  tgid:3557  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e00a1d84 r8:00000002 r7:60000113 r6:e00a1d8c r5:84afb000
 r4:84afb000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84afb000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b48740
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84afb000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0087000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:84afb000 r8:84b6a3ac r7:82804d40 r6:dddced40 r5:dddced60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:153:3559 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:153   state:D stack:0     pid:3559  tgid:3559  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e00add84 r8:00000002 r7:60000013 r6:e00add8c r5:84af8c00
 r4:84af8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84af8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ade08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84af8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0097000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2578c r4:84b25400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2578c r4:84b6a400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af8c00 r8:84b6a42c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8da27000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:154   state:D stack:0     pid:3560  tgid:3560  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73080
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84afa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00b7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b25b8c r4:84b25800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b25b8c r4:84b6a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84afa400 r8:84b6a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a480 r8:8027ed34 r7:e0091e60 r6:84b58c00 r5:84afa400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00b1fb0 to 0xe00b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73080
INFO: task kworker/0:154:3560 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:84b48100
task:kworker/0:155   state:D stack:0     pid:3563  tgid:3563  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73480
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84afbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00bf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b25f8c r4:84b25c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b25f8c r4:84b6a500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84afbc00 r8:84b6a52c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a500 r8:8027ed34 r7:e0091e60 r6:84b58c80 r5:84afbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d5fb0 to 0xe00d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e1e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84afc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00e7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2678c r4:84b26400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2678c r4:84b6a580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84afc800 r8:84b6a5ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a580 r8:8027ed34 r7:e0091e60 r6:84b58d00 r5:84afc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00e1fb0 to 0xe00e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73440
INFO: task kworker/0:156:3565 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8e2dc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:157:3566 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:157   state:D stack:0     pid:3566  tgid:3566  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:84afe000
 r4:84afe000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84afe000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84afe000 r8:84b6a62c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73440
INFO: task kworker/0:157:3566 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8e4ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84b48100
task:kworker/0:158   state:D stack:0     pid:3568  tgid:3568  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03f5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84afd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03f7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b26b8c r4:84b26800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b26b8c r4:84b6a680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84afd400 r8:84b6a6ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a680 r8:8027ed34 r7:e00e5e60 r6:84b58e00 r5:84afd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03f5fb0 to 0xe03f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73600
INFO: task kworker/0:158:3568 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fa0:                                     00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:84af6c00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0405e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84af6c00 r8:84b6a72c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a700 r8:8027ed34 r7:e00e5e60 r6:84b58e80 r5:84af6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0405fb0 to 0xe0405ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73680
INFO: task kworker/0:159:3570 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8eaca000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:160:3576 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:160   state:D stack:0     pid:3576  tgid:3576  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0425d84 r8:00000002 r7:60000013 r6:e0425d8c r5:84b01800
 r4:84b01800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b01800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0425e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84b01800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb3b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2778c r4:84b27400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2778c r4:84b6a780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b01800 r8:84b6a7ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a780 r8:8027ed34 r7:e00e5e60 r6:84b58f00 r5:84b01800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0425fb0 to 0xe0425ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73d00
INFO: task kworker/0:160:3576 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
5d20: 8ecf2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:84b48100
 r4:84b00c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0429e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73cc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84b00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb51000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b27b8c r4:84b27800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b27b8c r4:84b6a800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b00c00 r8:84b6a82c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a800 r8:8027ed34 r7:e0425e60 r6:84b58f80 r5:84b00c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0429fb0 to 0xe0429ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73d00
INFO: task kworker/0:161:3577 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8eeec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r4:82abe1e4
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:162   state:D stack:0     pid:3578  tgid:3578  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e042de08
 r5:84b2c38c r4:84b2c000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:829185c4 r9:e0435d84 r8:00000002 r7:60000113 r6:e0435d8c r5:84b03c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0435e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc69000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2c78c r4:84b2c400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2c78c r4:84b6a900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b03c00 r8:84b6a92c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a900 r8:8027ed34 r7:e042de60 r6:84bc8080 r5:84b03c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0435fb0 to 0xe0435ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73d00
INFO: task kworker/0:163:3579 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d60: 800d0113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:164:3581 blocked for more than 454 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0439d84 r8:00000002 r7:60000013 r6:e0439d8c r5:84b00000
 r4:84b00000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b00000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0439e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfbc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84b00000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2d38c r4:84b2d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2d38c r4:84b6a980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b00000 r8:84b6a9ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6a980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6a980 r8:8027ed34 r7:e0435e60 r6:84bc8100 r5:84b00000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0439fb0 to 0xe0439ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b73d00
INFO: task kworker/0:164:3581 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 8f906000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcd300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbe7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f1f8c r4:842f1c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f1f8c r4:84bc8180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b04800 r8:84bc81ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8180 r8:8027ed34 r7:dfd71e60 r6:84bc8200 r5:84b04800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0431fb0 to 0xe0431ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bcd000
INFO: task kworker/1:80:3584 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:81    state:D stack:0     pid:3585  tgid:3585  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84b05400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc03000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f2b8c r4:842f2800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f2b8c r4:84bc8280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b05400 r8:84bc82ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8280 r8:8027ed34 r7:e0431e60 r6:84bc8300 r5:84b05400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d1fb0 to 0xe00d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bcd240
INFO: task kworker/1:81:3585 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
5d60: 800d0113 ffffffff
 r4:dffd5dc0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcd5c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84b06000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc1b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9038c r4:84b90000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9038c r4:84bc8380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b06000 r8:84bc83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8380 r8:8027ed34 r7:e00d1e60 r6:84bc8400 r5:84b06000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0075fb0 to 0xe0075ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bcd280
INFO: task kworker/1:82:3588 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:83:3590 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:83    state:D stack:0     pid:3590  tgid:3590  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0441d84 r8:00000002 r7:60000113 r6:e0441d8c r5:84b06c00
 r4:84b06c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b06c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0441e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018205 r8:84b06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc51000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b90b8c r4:84b90800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b90b8c r4:84bc8480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b06c00 r8:84bc84ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8480 r8:8027ed34 r7:e0075e60 r6:84bc8500 r5:84b06c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0441fb0 to 0xe0441ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bcd440
INFO: task kworker/1:83:3590 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:84    state:D stack:0     pid:3592  tgid:3592  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e043de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dfc33000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9078c r4:84b90400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9078c r4:84bc8580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84af3000 r8:84bc85ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8580 r8:8027ed34 r7:e0441e60 r6:84bc8600 r5:84af3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe043dfb0 to 0xe043dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bcd540
INFO: task kworker/1:84:3592 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 904a2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
INFO: task kworker/1:85:3594 blocked for more than 454 seconds.
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0449e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b90f8c r4:84b90c00
 r10:61c88647 r9:84afec00 r8:84bc86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:84bc8680 r8:8027ed34 r7:e0441e60 r6:84bc8700 r5:84afec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0449fb0 to 0xe0449ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bcd640
INFO: task kworker/1:85:3594 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 906e7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
 r4:00000000
 r4:84b4a480
INFO: task kworker/1:86:3597 blocked for more than 454 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0445e08
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Call trace: 
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Workqueue: events bpf_prog_free_deferred
 r5:85000c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e044de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85000c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfea3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2cf8c r4:84b2cc00
 r4:84b6aa00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08
 r5:00001000 r4:dfc9f000
Exception stack(0xe0455fb0 to 0xe0455ff8)
Exception stack(0xdffd5d20 to 0xdffd5d68)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:85002400 r4:829185c0
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:61c88647 r9:85002400 r8:84bc8a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8a00 r8:8027ed34 r7:e0445e60 r6:84bc8a80 r5:85002400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0451fb0 to 0xe0451ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bcdd40
INFO: task kworker/1:88:3602 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 91547000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:89:3604 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:89    state:D stack:0     pid:3604  tgid:3604  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:85003000
 r4:85003000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85003000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85003000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe23000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2cb8c r4:84b2c800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2cb8c r4:84bc8b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85003000 r8:84bc8b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8b00 r8:8027ed34 r7:e0451e60 r6:84bc8b80 r5:85003000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0459fb0 to 0xe0459ff8)
9fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r4:00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:dffd5dc0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:90:3605 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84bc8c00 r8:8027ed34 r7:e0459e60 r6:84bc8c80 r5:85003c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0461fb0 to 0xe0461ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7d080
INFO: task kworker/1:90:3605 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 91ab7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e045de08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84bc8d00
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 91ec1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:92:3609 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:92    state:D stack:0     pid:3609  tgid:3609  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0469d84 r8:00000002 r7:60000113 r6:e0469d8c r5:849c6c00
 r4:849c6c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849c6c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0469e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7da00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:849c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff7d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b92b8c r4:84b92800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b92b8c r4:84bc8e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c6c00 r8:84bc8e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8e00 r8:8027ed34 r7:e045de60 r6:84b6aa80 r5:849c6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0469fb0 to 0xe0469ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7d300
INFO: task kworker/1:92:3609 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r4:84b48100
task:kworker/1:93    state:D stack:0     pid:3612  tgid:3612  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0465e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7d940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:849c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfef7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9278c r4:84b92400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9278c r4:84bc8e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c6000 r8:84bc8eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8e80 r8:8027ed34 r7:e0469e60 r6:84b6ab00 r5:849c6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0465fb0 to 0xe0465ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7d3c0
INFO: task kworker/1:93:3612 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9256a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:166:3613 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:166   state:D stack:0     pid:3613  tgid:3613  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e046dd84 r8:00000002 r7:60000113 r6:e046dd8c r5:849c4800
 r4:849c4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849c4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbff00
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:167:3615 blocked for more than 454 seconds.
 r4:849c5400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0471e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfdc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfed1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2d78c r4:84b2d400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2d78c r4:84b6ac80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c5400 r8:84b6acac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6ac80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6ac80 r8:8027ed34 r7:e046de60 r6:84b6ad00 r5:849c5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0471fb0 to 0xe0471ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bbf9c0
INFO: task kworker/0:167:3615 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0475e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75bc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaf5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2e78c r4:84b2e400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2e78c r4:84b6ad80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849c3c00 r8:84b6adac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b6ad80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b6ad80 r8:8027ed34 r7:e046de60 r6:84b6ae00 r5:849c3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0475fb0 to 0xe0475ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bbfd80
INFO: task kworker/0:168:3618 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 930dd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fa0:                                     00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:94:3621 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:94    state:D stack:0     pid:3621  tgid:3621  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0485d84 r8:00000002 r7:60000113 r6:e0485d8c r5:849c1800
 r4:849c1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849c1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0485e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7dfc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:849c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df915000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b93b8c r4:84b93800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b93b8c r4:84bc8f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:84bc8f00 r8:8027ed34 r7:e0469e60 r6:84b6ae80 r5:849c1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0485fb0 to 0xe0485ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7d880
INFO: task kworker/1:94:3621 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
 r4:00000001
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:95:3622 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:95    state:D stack:0     pid:3622  tgid:3622  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0489d84 r8:00000002 r7:60000113 r6:e0489d8c r5:84aee000
 r4:84aee000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84aee000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0489e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7db40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84aee000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff9d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b92f8c r4:84b92c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b92f8c r4:84bc8f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84aee000 r8:84bc8fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bc8f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bc8f80 r8:8027ed34 r7:e0485e60 r6:84b6af00 r5:84aee000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0489fb0 to 0xe0489ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7d880
INFO: task kworker/1:95:3622 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9379c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:169:3624 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:169   state:D stack:0     pid:3624  tgid:3624  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:84558000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018005 r8:84558000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b75080
INFO: task kworker/0:169:3624 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 93ed2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
 r4:84b48100
task:kworker/1:96    state:D stack:0     pid:3626  tgid:3626  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7dd80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84558c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0493000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9338c r4:84b93000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9338c r4:84b7c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84558c00 r8:84b7c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b7c000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b7c000 r8:8027ed34 r7:e0485e60 r6:84b78080 r5:84558c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0491fb0 to 0xe0491ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7d880
INFO: task kworker/1:96:3626 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:8455b000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7dd00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8455b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9a1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b93f8c r4:84b93c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b93f8c r4:84b7c100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8455b000 r8:84b7c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b7c100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b7c100 r8:8027ed34 r7:e0485e60 r6:84b78100 r5:8455b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0055fb0 to 0xe0055ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7df40
INFO: task kworker/1:97:3631 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 94135000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r4:84b48100
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:85005400 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85005400 r8:84b7c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b7c180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b7c180 r8:8027ed34 r7:e0055e60 r6:84b7c200 r5:85005400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0481fb0 to 0xe0481ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7df40
INFO: task kworker/1:98:3633 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9427b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:99    state:D stack:0     pid:3634  tgid:3634  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:dfa11000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 94cf7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:100:3635 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:100   state:D stack:0     pid:3635  tgid:3635  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0061d84 r8:00000002 r7:60000113 r6:e0061d8c r5:85006000
 r4:85006000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85006000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b76580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85006000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff4b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9d78c r4:84b9d400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9d78c r4:84b7c380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:101:3636 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:101   state:D stack:0     pid:3636  tgid:3636  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84b03000
 r4:84b03000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b03000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b76040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84b03000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa49000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b7c480 r8:8027ed34 r7:e0061e60 r6:84b7c500 r5:84b03000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
5d20: 94f8b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:102:3639 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:102   state:D stack:0     pid:3639  tgid:3639  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0071d84 r8:00000002 r7:60000113 r6:e0071d8c r5:847d8000
 r4:847d8000
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0071e08
 r4:00000000
 r5:00001000 r4:dfa85000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xe0071fb0 to 0xe0071ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
5d20: 9567b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:103:3641 blocked for more than 455 seconds.
task:kworker/1:103   state:D stack:0     pid:3641  tgid:3641  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e007de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:dfab5000
 r7:ddde2d40 r6:83018200 r5:84b9cf8c r4:84b7c680
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d20: 9571a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:170:3642 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:170   state:D stack:0     pid:3642  tgid:3642  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e008dd84 r8:00000002 r7:60000013 r6:e008dd8c r5:847d9800
 r4:847d9800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847d9800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75d00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb2f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2eb8c r4:84b2e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2eb8c r4:84b78180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847d9800 r8:84b781ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78180 r8:8027ed34 r7:e0475e60 r6:84b7c780 r5:847d9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe008dfb0 to 0xe008dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b75840
INFO: task kworker/0:170:3642 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
5d60: 800d0113 ffffffff
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:829185c4 r9:e009dd84 r8:00000002 r7:60000113 r6:e009dd8c r5:847da400
 r4:847da400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847da400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b768c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:847da400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff37000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9d38c r4:84b9d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9d38c r4:84b7c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847da400 r8:84b7c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b7c800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b7c800 r8:8027ed34 r7:e0061e60 r6:84b7c880 r5:847da400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe009dfb0 to 0xe009dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b76480
INFO: task kworker/1:104:3645 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 95f87000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:171:3647 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:171   state:D stack:0     pid:3647  tgid:3647  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e00cdd84 r8:00000002 r7:60000013 r6:e00cdd8c r5:847db000
 r4:847db000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847db000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75e00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847db000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd31000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2ef8c r4:84b2ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xe00cdfb0 to 0xe00cdff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
5fa0:                                     00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:172:3649 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:172   state:D stack:0     pid:3649  tgid:3649  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03fdd84 r8:00000002 r7:60000013 r6:e03fdd8c r5:847dbc00
 r4:847dbc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847dbc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03fde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff1b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b26f8c r4:84b26c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b26f8c r4:84b78280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847dbc00 r8:84b782ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78280 r8:8027ed34 r7:e00cde60 r6:84b7c980 r5:847dbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03fdfb0 to 0xe03fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b75c00
INFO: task kworker/0:172:3649 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 96616000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:173:3650 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:173   state:D stack:0     pid:3650  tgid:3650  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e040dd84 r8:00000002 r7:60000113 r6:e040dd8c r5:847dd400
 r4:847dd400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847dd400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e040de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75fc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd85000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2f38c r4:84b2f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2f38c r4:84b78300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847dd400 r8:84b7832c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78300 r8:8027ed34 r7:e03fde60 r6:84b7ca00 r5:847dd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe040dfb0 to 0xe040dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b75c00
INFO: task kworker/0:173:3650 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9685b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:174:3652 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:174   state:D stack:0     pid:3652  tgid:3652  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04add84 r8:00000002 r7:60000013 r6:e04add8c r5:847dc800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 96c7d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:175:3654 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:175   state:D stack:0     pid:3654  tgid:3654  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b5e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
 r5:00001000 r4:dfde1000
 r5:84b2fb8c r4:84b2f800
 r10:61c88647 r9:847de000 r8:84b7842c r7:82804d40 r6:dddced40 r5:dddced60
5fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:175:3654 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r5:800d0113 r4:80239bd0
 r4:dffd5dc0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:176:3656 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:176   state:D stack:0     pid:3656  tgid:3656  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04bdd84 r8:00000002 r7:60000013 r6:e04bdd8c r5:85010c00
 r4:85010c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85010c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04bde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85010c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff01000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2ff8c r4:84b2fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b2ff8c r4:84b78480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85010c00 r8:84b784ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78480 r8:8027ed34 r7:e03fde60 r6:84b7cb80 r5:85010c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04bdfb0 to 0xe04bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b75900
INFO: task kworker/0:176:3656 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 974b3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:177:3659 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:177   state:D stack:0     pid:3659  tgid:3659  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04c5d84 r8:00000002 r7:60000013 r6:e04c5d8c r5:85012400
 r4:85012400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85012400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85012400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e003b000
 r5:84b3478c r4:84b34400
 r10:00000000 r9:84b78500 r8:8027ed34 r7:e03fde60 r6:84b7cc00 r5:85012400
 r4:84bbf100
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 974b3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:8455bc00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b3438c r4:84b34000
 r10:61c88647 r9:8455bc00 r8:84b785ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78580 r8:8027ed34 r7:e04c5e60 r6:84b78600 r5:8455bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04b9fb0 to 0xe04b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bbf100
INFO: task kworker/0:178:3660 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 979d6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:8455e000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04cde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8455e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df961000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f2f8c r4:842f2c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f2f8c r4:84b7cc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8455e000 r8:84b7ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b7cc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b7cc80 r8:8027ed34 r7:e0061e60 r6:84b78680 r5:8455e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04cdfb0 to 0xe04cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b76a80
INFO: task kworker/1:105:3663 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 979d6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:106:3664 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:106   state:D stack:0     pid:3664  tgid:3664  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04d1d84 r8:00000002 r7:60000113 r6:e04d1d8c r5:8455c800
 r4:8455c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8455c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcde40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8455c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b76a80
INFO: task kworker/1:106:3664 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 98160000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b48100
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be79c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84559800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff65000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9eb8c r4:84b9e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9eb8c r4:84b7cd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84559800 r8:84b7cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b7cd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b7cd80 r8:8027ed34 r7:e04cde60 r6:84b78780 r5:84559800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
5d20: 98544000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:179   state:D stack:0     pid:3669  tgid:3669  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d5e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8455d400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0045000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b34b8c r4:84b34800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b34b8c r4:84b78800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8455d400 r8:84b7882c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78800 r8:8027ed34 r7:e04c5e60 r6:84b78880 r5:8455d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04d5fb0 to 0xe04d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b6d380
INFO: task kworker/0:179:3669 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r5:800d0113 r4:80239bd0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:180:3672 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:180   state:D stack:0     pid:3672  tgid:3672  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04e5d84 r8:00000002 r7:60000013 r6:e04e5d8c r5:85013000
 r4:85013000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85013000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85013000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0067000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b34f8c r4:84b34c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b34f8c r4:84b78900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85013000 r8:84b7892c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04e9d84 r8:00000002 r7:60000013 r6:e04e9d8c r5:85013c00
 r4:85013c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85013c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b752c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85013c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0547000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b36b8c r4:84b36800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b36b8c r4:84b78980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85013c00 r8:84b789ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78980 r8:8027ed34 r7:e04e5e60 r6:84b7ce80 r5:85013c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e9fb0 to 0xe04e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b6d380
INFO: task kworker/0:181:3673 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 99345000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:82abe1e4
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85015400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0089000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3538c r4:84b35000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3538c r4:84b78a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85015400 r8:84b78a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78a00 r8:8027ed34 r7:e04e9e60 r6:84b7cf00 r5:85015400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04f1fb0 to 0xe04f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b6d380
INFO: task kworker/0:182:3674 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d60: 800d0113 ffffffff
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6da80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85014800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00b9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3578c r4:84b35400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3578c r4:84b78a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85014800 r8:84b78aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78a80 r8:8027ed34 r7:e04e9e60 r6:84b7cf80 r5:85014800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04f9fb0 to 0xe04f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b6d9c0
INFO: task kworker/0:183:3676 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:184   state:D stack:0     pid:3678  tgid:3678  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0501d84 r8:00000002 r7:60000013 r6:e0501d8c r5:85011800
 r4:85011800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85011800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0501e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6dc00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85011800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00d9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b35b8c r4:84b35800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b35b8c r4:84b78b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85011800 r8:84b78b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78b00 r8:8027ed34 r7:e04e9e60 r6:84b7c080 r5:85011800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0501fb0 to 0xe0501ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 99a14000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r4:84b48100
task:kworker/0:185   state:D stack:0     pid:3680  tgid:3680  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:186:3682 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:186   state:D stack:0     pid:3682  tgid:3682  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:847dec00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0529e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:e04a5000
 r7:dddced40 r6:83018000 r5:84b9df8c r4:84b78c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0529fb0 to 0xe0529ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b6dbc0
INFO: task kworker/0:186:3682 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9a155000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r4:84b48100
task:kworker/0:187   state:D stack:0     pid:3684  tgid:3684  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6df00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85010000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e052f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3638c r4:84b36000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3638c r4:84b78c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85010000 r8:84b78cac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78c80 r8:8027ed34 r7:e04e9e60 r6:84bd0100 r5:85010000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0539fb0 to 0xe0539ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b6dc40
INFO: task kworker/0:187:3684 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9a155000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:85016000 r8:84b78d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78d00 r8:8027ed34 r7:e04e9e60 r6:84bd0180 r5:85016000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0545fb0 to 0xe0545ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b6de00
INFO: task kworker/0:188:3687 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9ab5e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:189:3688 blocked for more than 456 seconds.
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b78d80 r8:8027ed34 r7:e04e9e60 r6:84bd0280 r5:85018000
 r4:84b75780
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9ab5e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:85019800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fa0:                                     00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:191:3692 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:191   state:D stack:0     pid:3692  tgid:3692  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0585d84 r8:00000002 r7:60000113 r6:e0585d8c r5:8501a400
 r4:8501a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8501a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8501a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e056f000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:192:3695 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:192   state:D stack:0     pid:3695  tgid:3695  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05add84 r8:00000002 r7:60000113 r6:e05add8c r5:85018c00
 r4:85018c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85018c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc65c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05b7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b37b8c r4:84b37800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b37b8c r4:84b78f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85018c00 r8:84b78f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78f00 r8:8027ed34 r7:e0581e60 r6:84bd0400 r5:85018c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05adfb0 to 0xe05adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc61c0
INFO: task kworker/0:192:3695 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9b571000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:193:3696 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:193   state:D stack:0     pid:3696  tgid:3696  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05b5d84 r8:00000002 r7:60000013 r6:e05b5d8c r5:8501c800
 r4:8501c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8501c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05c3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b37f8c r4:84b37c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b37f8c r4:84b78f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8501c800 r8:84b78fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b78f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b78f80 r8:8027ed34 r7:e05ade60 r6:84bd0480 r5:8501c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05b5fb0 to 0xe05b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc6240
INFO: task kworker/0:193:3696 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9b8ee000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:194:3699 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:194   state:D stack:0     pid:3699  tgid:3699  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05d1d84 r8:00000002 r7:60000013 r6:e05d1d8c r5:8501d400
 r4:8501d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8501d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8501d400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb4f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3938c r4:84b39000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3938c r4:84bd4000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8501d400 r8:84bd402c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4000 r8:8027ed34 r7:e05b5e60 r6:84bd0500 r5:8501d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05d1fb0 to 0xe05d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc6580
INFO: task kworker/0:194:3699 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9bcf0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8455a400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a9e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc6780
INFO: task kworker/0:195:3700 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9c051000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc69c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8455ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
 r10:61c88647 r9:8455ec00 r8:84bd41ac r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84788000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc6b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84788000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05eb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b38b8c r4:84b38800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b38b8c r4:84bd4280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84788000 r8:84bd42ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Workqueue: events bpf_prog_free_deferred
 r5:800d0113 r4:80239bd0
 r4:82abe1e4
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:198   state:D stack:0     pid:3707  tgid:3707  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84788c00 r8:84bd43ac r7:82804d40 r6:dddced40 r5:dddced60
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc6b00
INFO: task kworker/0:198:3707 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9c735000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:199:3709 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0411e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b76500
 r10:61c88647 r9:84789800 r8:84bd44ac r7:82804d40 r6:dddced40 r5:dddced60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:200:3711 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:200   state:D stack:0     pid:3711  tgid:3711  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04c1d84 r8:00000002 r7:60000113 r6:e04c1d8c r5:8478b000
 r4:8478b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8478b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc0c40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8478b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb9b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3978c r4:84b39400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3978c r4:84bd4580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8478b000 r8:84bd45ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4580 r8:8027ed34 r7:e0411e60 r6:84bd4600 r5:8478b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04c1fb0 to 0xe04c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc6e00
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:e048dd84 r8:00000002 r7:60000013 r6:e048dd8c r5:8501e000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b39b8c r4:84b39800
 r4:84bd4680
 r10:00000000 r9:84bd4680 r8:8027ed34 r7:e04c1e60 r6:84bd0580 r5:8501e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe048dfb0 to 0xe048dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc6f40
INFO: task kworker/0:201:3713 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9d4b8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:202   state:D stack:0     pid:3716  tgid:3716  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84bd4700 r8:8027ed34 r7:e048de60 r6:84bd0600 r5:8501ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05fdfb0 to 0xe05fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be41c0
INFO: task kworker/0:202:3716 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9d7fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b3b38c r4:84b3b000
 r10:61c88647 r9:85020c00 r8:84bd47ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4780 r8:8027ed34 r7:e05fde60 r6:84bd0680 r5:85020c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0605fb0 to 0xe0605ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be41c0
INFO: task kworker/0:203:3718 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b3a38c r4:84b3a000
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:205:3720 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:205   state:D stack:0     pid:3720  tgid:3720  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:85022400
 r4:85022400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85022400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
 r10:61c88647 r9:85022400 r8:84bd48ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:206:3722 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:206   state:D stack:0     pid:3722  tgid:3722  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0419d84 r8:00000002 r7:60000113 r6:e0419d8c r5:8478bc00
 r4:8478bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8478bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0419e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be45c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8478bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc53000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3ab8c r4:84b3a800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3ab8c r4:84bd4900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8478bc00 r8:84bd492c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4900 r8:8027ed34 r7:e0605e60 r6:84bd4980 r5:8478bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0419fb0 to 0xe0419ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:207:3725 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:207   state:D stack:0     pid:3725  tgid:3725  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0615d84 r8:00000002 r7:60000013 r6:e0615d8c r5:8478c800
 r4:8478c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8478c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:207:3725 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r4:82abe1e4
 r4:00000000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:208   state:D stack:0     pid:3726  tgid:3726  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:8478d400
 r4:8478d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8478d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4d40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8478d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe95000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3bf8c r4:84b3bc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3bf8c r4:84bd4b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8478d400 r8:84bd4b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4b00 r8:8027ed34 r7:e0605e60 r6:84bd4b80 r5:8478d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0619fb0 to 0xe0619ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r4:00000000
 r5:8587db8c r4:8587d800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:84b48100
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85024800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcf3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b3b78c r4:84b3b400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b3b78c r4:84bd4c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85024800 r8:84bd4c2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4c00 r8:8027ed34 r7:e0619e60 r6:84bd0800 r5:85024800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0625fb0 to 0xe0625ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be4900
INFO: task kworker/0:209:3731 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
5d20: 9e981000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:829185c4 r9:e0629d84 r8:00000002 r7:60000113 r6:e0629d8c r5:85023c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08
 r4:00000000
 r5:84b3bb8c r4:84b3b800
 r10:00000000 r9:84bd4c80 r8:8027ed34 r7:e0619e60 r6:84bd0880 r5:85023c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
5d20: 9ed5b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:211:3734 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:211   state:D stack:0     pid:3734  tgid:3734  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0631d84 r8:00000002 r7:60000113 r6:e0631d8c r5:85023000
 r4:85023000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85023000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85023000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeaf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503838c r4:85038000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503838c r4:84bd4d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85023000 r8:84bd4d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4d00 r8:8027ed34 r7:e0619e60 r6:84bd0900 r5:85023000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0631fb0 to 0xe0631ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be4ac0
INFO: task kworker/0:211:3734 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9efcf000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:212:3735 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:212   state:D stack:0     pid:3735  tgid:3735  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0635d84 r8:00000002 r7:60000013 r6:e0635d8c r5:85026000
 r4:85026000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85026000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d20: 9f407000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:213:3737 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:213   state:D stack:0     pid:3737  tgid:3737  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0641d84 r8:00000002 r7:60000013 r6:e0641d8c r5:85025400
 r4:85025400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85025400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be48c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85025400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfec7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503878c r4:85038400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503878c r4:84bd4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85025400 r8:84bd4e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4e00 r8:8027ed34 r7:e0635e60 r6:84bd0a00 r5:85025400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0641fb0 to 0xe0641ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be4cc0
INFO: task kworker/0:213:3737 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9f646000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:82abe1e4
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:214:3739 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:214   state:D stack:0     pid:3739  tgid:3739  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0645d84 r8:00000002 r7:60000113 r6:e0645d8c r5:85026c00
 r4:85026c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85026c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3240
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85026c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e041f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85038f8c r4:85038c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85038f8c r4:84bd4e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85026c00 r8:84bd4eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4e80 r8:8027ed34 r7:e0635e60 r6:84bd0a80 r5:85026c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0645fb0 to 0xe0645ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be4f80
INFO: task kworker/0:214:3739 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9fb0d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:108   state:D stack:0     pid:3741  tgid:3741  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff9b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9ef8c r4:84b9ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9ef8c r4:84bd0b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85020000 r8:84bd0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bd0b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd0b00 r8:8027ed34 r7:e04cde60 r6:84bd0b80 r5:85020000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0639fb0 to 0xe0639ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be7b80
INFO: task kworker/1:108:3741 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9fbd0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:215:3743 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:215   state:D stack:0     pid:3743  tgid:3743  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e061dd84 r8:00000002 r7:60000013 r6:e061dd8c r5:8501bc00
 r4:8501bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8501bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8501bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03ff000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9f38c r4:84b9f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b9f38c r4:84bd4f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8501bc00 r8:84bd4f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4f00 r8:8027ed34 r7:e0645e60 r6:84bd0c00 r5:8501bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe061dfb0 to 0xe061dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848c3a40
INFO: task kworker/0:215:3743 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: 9ff2a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fa0:                                     00000000 00000000 00000000 00000000
 r4:84b48100
      Not tainted 6.16.0-rc3-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r5:8501b000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851721c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8501b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05cd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9ff8c r4:84b9fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9ff8c r4:84bd0c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8501b000 r8:84bd0cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bd0c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd0c80 r8:8027ed34 r7:e04cde60 r6:84bd0d00 r5:8501b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0649fb0 to 0xe0649ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84be7880
INFO: task kworker/1:109:3746 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a040d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
task:kworker/0:216   state:D stack:0     pid:3748  tgid:3748  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503978c r4:84bd4f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85028c00 r8:84bd4fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bd4f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bd4f80 r8:8027ed34 r7:e0645e60 r6:84bd0d80 r5:85028c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0659fb0 to 0xe0659ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf30c0
INFO: task kworker/0:216:3748 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a06f4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:217:3750 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:217   state:D stack:0     pid:3750  tgid:3750  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0669d84 r8:00000002 r7:60000013 r6:e0669d8c r5:85028000
 r4:85028000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85028000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3340
 r5:8503938c r4:85039000
 r10:00000000 r9:84bef000 r8:8027ed34 r7:e0659e60 r6:84bd0e00 r5:85028000
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:218:3752 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:218   state:D stack:0     pid:3752  tgid:3752  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:8502b000
 r4:8502b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8502b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8502b000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0673000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85039b8c r4:85039800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85039b8c r4:84bef080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8502b000 r8:84bef0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef080 r8:8027ed34 r7:e0659e60 r6:84bd0e80 r5:8502b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0671fb0 to 0xe0671ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf30c0
INFO: task kworker/0:218:3752 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a0b85000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:219:3753 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:219   state:D stack:0     pid:3753  tgid:3753  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e067dd84 r8:00000002 r7:60000113 r6:e067dd8c r5:85029800
 r4:85029800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85029800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85029800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0693000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503a38c r4:8503a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503a38c r4:84bef100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85029800 r8:84bef12c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef100 r8:8027ed34 r7:e0671e60 r6:84bd0f00 r5:85029800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe067dfb0 to 0xe067dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf30c0
INFO: task kworker/0:219:3753 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a11ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:84b4a480
 r4:00000001
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
task:kworker/0:220   state:D stack:0     pid:3755  tgid:3755  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3740
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8502a400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0687000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85039f8c r4:85039c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85039f8c r4:84bef180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8502a400 r8:84bef1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef180 r8:8027ed34 r7:e067de60 r6:84bd0f80 r5:8502a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0685fb0 to 0xe0685ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3400
INFO: task kworker/0:220:3755 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a1323000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:221:3757 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:221   state:D stack:0     pid:3757  tgid:3757  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:8502bc00
 r4:8502bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8502bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8502bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06d3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503b38c r4:8503b000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503b38c r4:84bef200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8502bc00 r8:84bef22c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef200 r8:8027ed34 r7:e067de60 r6:84bd0200 r5:8502bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe069dfb0 to 0xe069dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3500
INFO: task kworker/0:221:3757 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:222:3759 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:222   state:D stack:0     pid:3759  tgid:3759  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:8502c800
 r4:8502c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8502c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8502c800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06a7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503a78c r4:8503a400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503a78c r4:84bef280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8502c800 r8:84bef2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef280 r8:8027ed34 r7:e069de60 r6:85076000 r5:8502c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a5fb0 to 0xe06a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3500
INFO: task kworker/0:222:3759 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a19b9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:223:3761 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:223   state:D stack:0     pid:3761  tgid:3761  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06bdd84 r8:00000002 r7:60000113 r6:e06bdd8c r5:8502ec00
 r4:8502ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8502ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06bde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3b00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8502ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06b3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503ab8c r4:8503a800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503ab8c r4:84bef300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8502ec00 r8:84bef32c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef300 r8:8027ed34 r7:e069de60 r6:85076080 r5:8502ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06bdfb0 to 0xe06bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3800
INFO: task kworker/0:223:3761 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a1b6e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
Call trace: 
 r10:829185c4 r9:e041dd84 r8:00000002 r7:60000113 r6:e041dd8c r5:8478e000
 r4:8478e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8478e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e041de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3c40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8478e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06bf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503af8c r4:8503ac00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503af8c r4:84bef380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8478e000 r8:84bef3ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef380 r8:8027ed34 r7:e069de60 r6:84bef400 r5:8478e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe041dfb0 to 0xe041dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3900
INFO: task kworker/0:224:3764 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a1e07000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:225:3766 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:225   state:D stack:0     pid:3766  tgid:3766  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:8478ec00
 r4:8478ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8478ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7180
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8478ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06ef000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503bb8c r4:8503b800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503bb8c r4:84bef480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8478ec00 r8:84bef4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef480 r8:8027ed34 r7:e069de60 r6:84bef500 r5:8478ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c9fb0 to 0xe06c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3bc0
INFO: task kworker/0:225:3766 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a220d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:226:3767 blocked for more than 457 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:226   state:D stack:0     pid:3767  tgid:3767  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:8478a400
 r4:8478a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8478a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8478a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06e3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503b78c r4:8503b400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503b78c r4:84bef580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8478a400 r8:84bef5ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef580 r8:8027ed34 r7:e06c9e60 r6:84bef600 r5:8478a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0651fb0 to 0xe0651ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84bf3bc0
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
5d60: 800d0113 ffffffff
 r4:82abe1e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:227:3770 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:227   state:D stack:0     pid:3770  tgid:3770  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06edd84 r8:00000002 r7:60000013 r6:e06edd8c r5:84550c00
 r4:84550c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84550c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84550c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e070f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504038c r4:85040000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504038c r4:84bef680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84550c00 r8:84bef6ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef680 r8:8027ed34 r7:e06c9e60 r6:84bef700 r5:84550c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06edfb0 to 0xe06edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3f00
INFO: task kworker/0:227:3770 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a277c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:228:3772 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:228   state:D stack:0     pid:3772  tgid:3772  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06e1d84 r8:00000002 r7:60000013 r6:e06e1d8c r5:84551800
 r4:84551800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84551800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079200
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84551800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8503bf8c r4:8503bc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8503bf8c r4:84bef780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84551800 r8:84bef7ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef780 r8:8027ed34 r7:e06ede60 r6:84bef800 r5:84551800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06e1fb0 to 0xe06e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85079080
INFO: task kworker/0:228:3772 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a277c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:84b4a480
 r4:00000001
5fa0:                                     00000000 00000000 00000000 00000000
 r4:84b48100
      Not tainted 6.16.0-rc3-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:e070dd84 r8:00000002 r7:60000013 r6:e070dd8c r5:84552400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850794c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84552400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e071b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504078c r4:85040400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504078c r4:84bef880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84552400 r8:84bef8ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef880 r8:8027ed34 r7:e06ede60 r6:84bef900 r5:84552400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe070dfb0 to 0xe070dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850791c0
INFO: task kworker/0:229:3774 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a29f6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:230:3776 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:230   state:D stack:0     pid:3776  tgid:3776  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0719d84 r8:00000002 r7:60000013 r6:e0719d8c r5:84553000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84553000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0727000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85040b8c r4:85040800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85040b8c r4:84bef980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84553000 r8:84bef9ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bef980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bef980 r8:8027ed34 r7:e070de60 r6:84befa00 r5:84553000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0719fb0 to 0xe0719ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850792c0
INFO: task kworker/0:230:3776 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a35fa000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:231:3778 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:231   state:D stack:0     pid:3778  tgid:3778  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0725d84 r8:00000002 r7:60000013 r6:e0725d8c r5:84553c00
 r4:84553c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84553c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84553c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e073b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85040f8c r4:85040c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85040f8c r4:84befa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84553c00 r8:84befaac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84befa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84befa80 r8:8027ed34 r7:e0719e60 r6:84befb00 r5:84553c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0725fb0 to 0xe0725ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85079440
INFO: task kworker/0:231:3778 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a39fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:232:3780 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:232   state:D stack:0     pid:3780  tgid:3780  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:84554800
 r4:84554800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84554800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079ac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84554800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0753000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504178c r4:85041400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504178c r4:84befb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84554800 r8:84befbac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84befb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84befb80 r8:8027ed34 r7:e0725e60 r6:84befc00 r5:84554800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0739fb0 to 0xe0739ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85079680
INFO: task kworker/0:232:3780 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a39fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:233:3782 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:233   state:D stack:0     pid:3782  tgid:3782  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0745d84 r8:00000002 r7:60000013 r6:e0745d8c r5:84555400
 r4:84555400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84555400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:61c88647 r9:84555400 r8:84befcac r7:82804d40 r6:dddced40 r5:dddced60
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:234:3783 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:234   state:D stack:0     pid:3783  tgid:3783  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0751d84 r8:00000002 r7:60000013 r6:e0751d8c r5:84556000
 r4:84556000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84556000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079c80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84556000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:84556c00
 r4:84556c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84556c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3fc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84556c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0787000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504238c r4:85042000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504238c r4:84befe80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84556c00 r8:84befeac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84befe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84befe80 r8:8027ed34 r7:e0751e60 r6:84beff00 r5:84556c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe076dfb0 to 0xe076dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85079d00
INFO: task kworker/0:235:3786 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:84b48100
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079d80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84550000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e077f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85041f8c r4:85041c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85041f8c r4:84beff80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84550000 r8:84beffac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84beff80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84beff80 r8:8027ed34 r7:e076de60 r6:8508c000 r5:84550000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0791fb0 to 0xe0791ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85079cc0
INFO: task kworker/0:236:3787 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a4e2a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r7:dddced40 r6:83018000 r5:85042b8c r4:8508c080
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf3f00
INFO: task kworker/0:237:3790 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a5292000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:238   state:D stack:0     pid:3791  tgid:3791  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0795e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84998c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e079f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504278c r4:85042400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504278c r4:8508c180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84998c00 r8:8508c1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508c180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508c180 r8:8027ed34 r7:e077de60 r6:8508c200 r5:84998c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0795fb0 to 0xe0795ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85091000
INFO: task kworker/0:238:3791 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a5292000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:239:3795 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:239   state:D stack:0     pid:3795  tgid:3795  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e079dd84 r8:00000002 r7:60000013 r6:e079dd8c r5:84999800
 r4:84999800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091600
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84999800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa31000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504338c r4:85043000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504338c r4:8508c280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84999800 r8:8508c2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508c280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508c280 r8:8027ed34 r7:e077de60 r6:8508c300 r5:84999800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe079dfb0 to 0xe079dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85091180
INFO: task kworker/0:239:3795 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a5fa7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:8508c380 r8:8027ed34 r7:e079de60 r6:8508c400 r5:8499a400
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:241:3798 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:241   state:D stack:0     pid:3798  tgid:3798  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04ddd84 r8:00000002 r7:60000013 r6:e04ddd8c r5:8499bc00
 r4:8499bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8499bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8499bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfac1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85043b8c r4:85043800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85043b8c r4:8508c480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:8508c480 r8:8027ed34 r7:e079de60 r6:8508c500 r5:8499bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04ddfb0 to 0xe04ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85091480
INFO: task kworker/0:241:3798 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a68b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:84b4a480
5fa0:                                     00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:8499c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8499c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091740
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8499c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa6d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504378c r4:85043400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504378c r4:8508c580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8499c800 r8:8508c5ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508c580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508c580 r8:8027ed34 r7:e04dde60 r6:8508c600 r5:8499c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0589fb0 to 0xe0589ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850915c0
INFO: task kworker/0:242:3800 is blocked on a mutex likely owned by task kworker/0:129:3505.
Workqueue: events bpf_prog_free_deferred
5d20: a70b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:243:3801 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:243   state:D stack:0     pid:3801  tgid:3801  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0535d84 r8:00000002 r7:60000113 r6:e0535d8c r5:8499e000
 r4:8499e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8499e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091c40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
INFO: task kworker/0:244:3804 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05bdd84 r8:00000002 r7:60000113 r6:e05bdd8c r5:8499ec00
 r4:8499ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8499ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091e40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8499ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd87000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504c38c r4:8504c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504c38c r4:8508c780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8499ec00 r8:8508c7ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508c780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508c780 r8:8027ed34 r7:e0535e60 r6:8508c800 r5:8499ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05bdfb0 to 0xe05bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85091ac0
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:84b48100
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:245   state:D stack:0     pid:3807  tgid:3807  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0599d84 r8:00000002 r7:60000113 r6:e0599d8c r5:8499b000
 r4:8499b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8499b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0599e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091f80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8499b000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdcd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504c78c r4:8504c400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504c78c r4:8508c880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8499b000 r8:8508c8ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508c880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508c880 r8:8027ed34 r7:e05bde60 r6:8508c900 r5:8499b000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d20: a75c3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:8499d400 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0541e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079fc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8499d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeff000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504cb8c r4:8504c800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504cb8c r4:8508c980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8499d400 r8:8508c9ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508c980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508c980 r8:8027ed34 r7:e0599e60 r6:8508ca00 r5:8499d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0541fb0 to 0xe0541ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85091e00
INFO: task kworker/0:246:3809 is blocked on a mutex likely owned by task kworker/0:129:3505.
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
5fa0:                                     00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace: 
 r4:85033000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c0c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85033000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff1f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504cf8c r4:8504cc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504cf8c r4:8508ca80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85033000 r8:8508caac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508ca80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508ca80 r8:8027ed34 r7:e0541e60 r6:85076100 r5:85033000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05e5fb0 to 0xe05e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85091f40
INFO: task kworker/0:247:3811 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a7cc4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:248:3812 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:248   state:D stack:0     pid:3812  tgid:3812  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c140
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85030000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c2c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85034800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff35000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504d38c r4:8504d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504d38c r4:8508cb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85034800 r8:8508cbac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508cb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508cb80 r8:8027ed34 r7:e05f1e60 r6:85076200 r5:85034800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07adfb0 to 0xe07adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c140
INFO: task kworker/0:249:3815 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a8968000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:250:3816 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:250   state:D stack:0     pid:3816  tgid:3816  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e07b1d84 r8:00000002 r7:60000013 r6:e07b1d8c r5:85033c00
 r4:85033c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85033c00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504df8c r4:8508cc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85033c00 r8:8508ccac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508cc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508cc80 r8:8027ed34 r7:e05f1e60 r6:85076280 r5:85033c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07b1fb0 to 0xe07b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c140
INFO: task kworker/0:250:3816 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a8968000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85030c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:8587db8c r4:8587d800
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:252:3821 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:252   state:D stack:0     pid:3821  tgid:3821  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e07b5d84 r8:00000002 r7:60000013 r6:e07b5d8c r5:849b0c00
 r4:849b0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ca00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e005d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504e78c r4:8504e400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504e78c r4:8508cd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b0c00 r8:8508cd2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508cd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508cd00 r8:8027ed34 r7:e07b1e60 r6:8508cd80 r5:849b0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07b5fb0 to 0xe07b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 800d0113 ffffffff
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:253:3822 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:253   state:D stack:0     pid:3822  tgid:3822  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05d9d84 r8:00000002 r7:60000113 r6:e05d9d8c r5:849b1800
 r4:849b1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
5d20: a9591000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e07c1d84 r8:00000002 r7:60000013 r6:e07c1d8c r5:849b2400
 r4:849b2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cf40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00db000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504f78c r4:8504f400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504f78c r4:8508cf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b2400 r8:8508cf2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8508cf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8508cf00 r8:8027ed34 r7:e07b5e60 r6:8508cf80 r5:849b2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07c1fb0 to 0xe07c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c880
INFO: task kworker/0:254:3825 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a98b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:255   state:D stack:0     pid:3827  tgid:3827  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:256:3828 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:256   state:D stack:0     pid:3828  tgid:3828  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e07edd84 r8:00000002 r7:60000013 r6:e07edd8c r5:85035400
 r4:85035400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85035400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cc80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85035400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0099000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504ef8c r4:8504ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504ef8c r4:850ab100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85035400 r8:850ab12c r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab100 r8:8027ed34 r7:e07c1e60 r6:85076380 r5:85035400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07edfb0 to 0xe07edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c980
INFO: task kworker/0:256:3828 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: a9d2d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:257   state:D stack:0     pid:3832  tgid:3832  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4809e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ce00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85036000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00bd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504f38c r4:8504f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504f38c r4:850ab180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85036000 r8:850ab1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab180 r8:8027ed34 r7:e07c1e60 r6:85076400 r5:85036000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4809fb0 to 0xe4809ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509cdc0
INFO: task kworker/0:257:3832 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: aa372000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:258:3833 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r4:84bf8f80
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: aa50c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:259:3835 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:259   state:D stack:0     pid:3835  tgid:3835  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e481dd84 r8:00000002 r7:60000013 r6:e481dd8c r5:8502e000
 r4:8502e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8502e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e481de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8502e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04af000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505038c r4:85050000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505038c r4:850ab280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8502e000 r8:850ab2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab280 r8:8027ed34 r7:e480de60 r6:85076500 r5:8502e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe481dfb0 to 0xe481dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/0:260:3836 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:260   state:D stack:0     pid:3836  tgid:3836  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4821d84 r8:00000002 r7:60000113 r6:e4821d8c r5:8502d400
 r4:8502d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8502d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4821e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8502d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e049b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8504ff8c r4:8504fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8504ff8c r4:850ab300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:850ab300
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: aabbe000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
INFO: task kworker/0:261:3839 blocked for more than 458 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4829e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe4829fb0 to 0xe4829ff8)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: aabbe000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e482de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:263:3843 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:263   state:D stack:0     pid:3843  tgid:3843  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4831d84 r8:00000002 r7:60000113 r6:e4831d8c r5:850f0000
 r4:850f0000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f0000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4831e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851626c0
 r4:00000000
 r5:00001000 r4:e0521000
 r10:61c88647 r9:850f0000 r8:850ab4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85162180
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:264   state:D stack:0     pid:3844  tgid:3844  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4835d84 r8:00000002 r7:60000013 r6:e4835d8c r5:850f0c00
 r4:850f0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4835e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb87000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505238c r4:85052000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505238c r4:850ab500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f0c00 r8:850ab52c r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab500 r8:8027ed34 r7:e4831e60 r6:85076780 r5:850f0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4835fb0 to 0xe4835ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:eca19000
 r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:265:3847 blocked for more than 458 seconds.
 r4:850f3000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4841e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e053d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505138c r4:85051000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505138c r4:850ab580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f3000 r8:850ab5ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab580 r8:8027ed34 r7:e4835e60 r6:85076800 r5:850f3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4841fb0 to 0xe4841ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85162540
INFO: task kworker/0:265:3847 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r5:800d0113 r4:80239bd0
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4849e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8505178c r4:85051400
 r10:00000000 r9:850ab600 r8:8027ed34 r7:e4835e60 r6:85076880 r5:850f1800
INFO: task kworker/0:266:3849 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r5:800d0113 r4:80239bd0
 r4:dffd5dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:267:3850 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:267   state:D stack:0     pid:3850  tgid:3850  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e484dd84 r8:00000002 r7:60000013 r6:e484dd8c r5:850f2400
 r4:850f2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e484de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162a40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0577000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85051b8c r4:85051800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85051b8c r4:850ab680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f2400 r8:850ab6ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab680 r8:8027ed34 r7:e4835e60 r6:85076900 r5:850f2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe484dfb0 to 0xe484dff8)
dfa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:267:3850 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r5:800d0113 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:268:3853 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:268   state:D stack:0     pid:3853  tgid:3853  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4851d84 r8:00000002 r7:60000013 r6:e4851d8c r5:850f4800
 r4:850f4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4851e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84617d80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e059d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9fb8c r4:84b9f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b9fb8c r4:850ab700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f4800 r8:850ab72c r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:850ab700 r8:8027ed34 r7:e4835e60 r6:85076980 r5:850f4800
 r4:85162900
Call trace: 
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:269:3854 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r5:00001000 r4:dfbb3000
 r4:00000001
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
INFO: task kworker/1:110:3857 blocked for more than 458 seconds.
 r4:850f6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4845e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851722c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:850f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07ef000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f278c r4:842f2400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f278c r4:85076a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f6000 r8:85076aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85076a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85076a80 r8:8027ed34 r7:e04cde60 r6:85076b00 r5:850f6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4845fb0 to 0xe4845ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851720c0
INFO: task kworker/1:110:3857 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r4:00000000
 r4:82abe1e4
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/1:111:3861 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e07bdd84 r8:00000002 r7:60000113 r6:e07bdd8c r5:850f6c00
 r4:850f6c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f6c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:850f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb43000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f238c r4:842f2000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f238c r4:85076b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f6c00 r8:85076bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85076b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85076b80 r8:8027ed34 r7:e04cde60 r6:85076c00 r5:850f6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07bdfb0 to 0xe07bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:112:3863 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:112   state:D stack:0     pid:3863  tgid:3863  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4811d84 r8:00000002 r7:60000013 r6:e4811d8c r5:850f3c00
 r4:850f3c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f3c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4811e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfda1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513578c r4:85135400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513578c r4:85076c80
 r10:61c88647 r9:850f3c00 r8:85076cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ad5fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:113:3864 blocked for more than 459 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:85076d80 r8:8027ed34 r7:e4811e60 r6:85076e00 r5:850f8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0681fb0 to 0xe0681ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85172340
INFO: task kworker/1:113:3864 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: adb89000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:270:3866 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:270   state:D stack:0     pid:3866  tgid:3866  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:850f9800
 r4:850f9800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f9800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162c40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbd3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:850f9800 r8:850ab82c r7:82804d40 r6:dddced40 r5:dddced60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:84b48100
task:kworker/0:271   state:D stack:0     pid:3868  tgid:3868  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:850fb000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc13000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85052f8c r4:85052c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85052f8c r4:850ab880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850fb000 r8:850ab8ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab880 r8:8027ed34 r7:e0691e60 r6:85076f00 r5:850fb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a1fb0 to 0xe06a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851623c0
INFO: task kworker/0:271:3868 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
5d60: 800d0113 ffffffff
 r4:dffd5dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:272:3870 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:272   state:D stack:0     pid:3870  tgid:3870  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:850fa400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:850ab900 r8:8027ed34 r7:e06a1e60 r6:85076f80 r5:850fa400
INFO: task kworker/0:272:3870 is blocked on a mutex likely owned by task kworker/0:129:3505.
5d60: 800d0113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:273:3871 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:273   state:D stack:0     pid:3871  tgid:3871  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:850fbc00
 r4:850fbc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850fbc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160900
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe1b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505838c r4:85058000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505838c r4:850ab980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850fbc00 r8:850ab9ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850ab980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ab980 r8:8027ed34 r7:e06b1e60 r6:8516e000 r5:850fbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b9fb0 to 0xe06b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85160240
INFO: task kworker/0:273:3871 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: aeaff000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
 r4:00000000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:850aba00 r8:8027ed34 r7:e06b9e60 r6:8516e080 r5:850fd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06e9fb0 to 0xe06e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85160100
INFO: task kworker/0:274:3873 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: aed7a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:275:3875 blocked for more than 459 seconds.
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160540
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xe0679fb0 to 0xe0679ff8)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: af194000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:276:3878 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfccb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85053f8c r4:85053c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85053f8c r4:850abb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b6000 r8:850abbac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850abb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850abb80 r8:8027ed34 r7:e06b9e60 r6:850abc00 r5:849b6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06f5fb0 to 0xe06f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85160580
INFO: task kworker/0:276:3878 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: af757000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:85160580
INFO: task kworker/0:277:3879 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: af7bd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:278:3882 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:278   state:D stack:0     pid:3882  tgid:3882  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160b00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfec3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85058b8c r4:85058800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85058b8c r4:850abd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:850abd80 r8:8027ed34 r7:e068de60 r6:8516e100 r5:850fc800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:279:3884 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:279   state:D stack:0     pid:3884  tgid:3884  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4865d84 r8:00000002 r7:60000113 r6:e4865d8c r5:850f8c00
 r4:850f8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4865e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:850f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffa5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505938c r4:85059000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:280:3885 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:280   state:D stack:0     pid:3885  tgid:3885  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4869d84 r8:00000002 r7:60000013 r6:e4869d8c r5:850fec00
 r4:850fec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4869e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:850abe80 r8:8027ed34 r7:e4865e60 r6:8516e200 r5:850fec00
 r4:85160b80
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:281:3888 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:281   state:D stack:0     pid:3888  tgid:3888  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e486dd84 r8:00000002 r7:60000113 r6:e486dd8c r5:850fe000
 r4:850fe000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850fe000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e486de08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:850fe000 r8:850abf2c r7:82804d40 r6:dddced40 r5:dddced60
dfa0:                                     00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:282:3889 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:282   state:D stack:0     pid:3889  tgid:3889  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4871d84 r8:00000002 r7:60000113 r6:e4871d8c r5:85100000
 r4:85100000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85100000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4871e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505af8c r4:8505ac00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505af8c r4:850abf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85100000 r8:850abfac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850abf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850abf80 r8:8027ed34 r7:e4865e60 r6:8516e300 r5:85100000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4871fb0 to 0xe4871ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85160b80
INFO: task kworker/0:282:3889 is blocked on a mutex likely owned by task kworker/0:129:3505.
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:283:3891 blocked for more than 459 seconds.
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4879d84 r8:00000002 r7:60000013 r6:e4879d8c r5:85101800
 r4:85101800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85101800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4879e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160fc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85101800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0415000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505978c r4:85059400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505978c r4:8517c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85101800 r8:8517c02c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c000 r8:8027ed34 r7:e4871e60 r6:8516e380 r5:85101800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4879fb0 to 0xe4879ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85160d40
INFO: task kworker/0:283:3891 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:284:3893 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:284   state:D stack:0     pid:3893  tgid:3893  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8889d84 r8:00000002 r7:60000113 r6:e8889d8c r5:85100c00
 r4:85100c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85100c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8889e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85100c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0499000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85059b8c r4:85059800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85059b8c r4:8517c080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85100c00 r8:8517c0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c080 r8:8027ed34 r7:e4871e60 r6:8516e400 r5:85100c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8889fb0 to 0xe8889ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85162ec0
INFO: task kworker/0:284:3893 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b144d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:85102400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d0c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85102400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05ff000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85059f8c r4:85059c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85059f8c r4:8517c100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85102400 r8:8517c12c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c100 r8:8027ed34 r7:e4871e60 r6:8516e480 r5:85102400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8891fb0 to 0xe8891ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d040
INFO: task kworker/0:285:3895 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d60: 800d0113 ffffffff
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:286:3897 blocked for more than 459 seconds.
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e889de08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85103000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e061f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505a38c r4:8505a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505a38c r4:8517c180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85103000 r8:8517c1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c180 r8:8027ed34 r7:e4871e60 r6:8516e500 r5:85103000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe889dfb0 to 0xe889dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d040
INFO: task kworker/0:286:3897 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b1b0a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:287   state:D stack:0     pid:3899  tgid:3899  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:85103c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d480
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85103c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e064d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505a78c r4:8505a400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505a78c r4:8517c200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85103c00 r8:8517c22c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c200 r8:8027ed34 r7:e4871e60 r6:8516e580 r5:85103c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88a5fb0 to 0xe88a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d400
INFO: task kworker/0:287:3899 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b212d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:84b4a480
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:288   state:D stack:0     pid:3901  tgid:3901  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ade08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018005 r8:85104800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e065d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505ab8c r4:8505a800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505ab8c r4:8517c280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85104800 r8:8517c2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c280 r8:8027ed34 r7:e4871e60 r6:8516e600 r5:85104800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88adfb0 to 0xe88adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d280
INFO: task kworker/0:288:3901 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r5:800d0113 r4:80239bd0
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:289:3904 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:289   state:D stack:0     pid:3904  tgid:3904  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e88b1d84 r8:00000002 r7:60000113 r6:e88b1d8c r5:85106000
 r4:85106000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85106000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d600
INFO: task kworker/0:289:3904 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b26d5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d980
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85106c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06d5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505b78c r4:8505b400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505b78c r4:8517c380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85106c00 r8:8517c3ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c380 r8:8027ed34 r7:e88b1e60 r6:8516e700 r5:85106c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88b5fb0 to 0xe88b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d600
INFO: task kworker/0:290:3906 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b2880000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
      Not tainted 6.16.0-rc3-syzkaller #0
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b9e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dac0
 r9:83018005 r8:85105400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06f1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505bb8c r4:8505b800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505bb8c r4:8517c400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85105400 r8:8517c42c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c400 r8:8027ed34 r7:e88b5e60 r6:8516e780 r5:85105400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88b9fb0 to 0xe88b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d800
INFO: task kworker/0:291:3908 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b29d4000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:292   state:D stack:0     pid:3909  tgid:3909  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c5e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018005 r8:85108000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0789000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505c38c r4:8505c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505c38c r4:8517c480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85108000 r8:8517c4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c480 r8:8027ed34 r7:e88b9e60 r6:8516e800 r5:85108000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88c5fb0 to 0xe88c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d940
INFO: task kworker/0:292:3909 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b2d9d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:293:3911 blocked for more than 459 seconds.
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a9e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85134b8c r4:85134800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85134b8c r4:8517c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b0000 r8:8517c52c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c500 r8:8027ed34 r7:e88c5e60 r6:8517c580 r5:849b0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88a9fb0 to 0xe88a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517d780
INFO: task kworker/0:293:3911 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b2f65000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:294   state:D stack:0     pid:3914  tgid:3914  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c9e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:e0775000
 r10:61c88647 r9:849b3c00 r8:8517c62c r7:82804d40 r6:dddced40 r5:dddced60
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517db40
INFO: task kworker/0:294:3914 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b32d8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:295:3917 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b35b5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
INFO: task kworker/0:296:3921 blocked for more than 459 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e88cdd84 r8:00000002 r7:60000113 r6:e88cdd8c r5:84748000
 r4:84748000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84748000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88cde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162b80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84748000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df96f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505cb8c r4:8505c800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505cb8c r4:8517c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xe88cdfb0 to 0xe88cdff8)
INFO: task kworker/0:296:3921 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r5:800d0113 r4:80239bd0
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:e0721d84 r8:00000002 r7:60000113 r6:e0721d8c r5:84748c00
 r4:84748c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84748c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84748c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaed000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505d38c r4:8505d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505d38c r4:8517c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84748c00 r8:8517c92c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517c900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517c900 r8:8027ed34 r7:e88cde60 r6:8517c980 r5:84748c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0721fb0 to 0xe0721ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:298:3923 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:298   state:D stack:0     pid:3923  tgid:3923  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e07f9d84 r8:00000002 r7:60000113 r6:e07f9d8c r5:84749800
 r4:84749800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84749800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84749800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa91000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505cf8c r4:8505cc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505cf8c r4:8517ca00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84749800 r8:8517ca2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517ca00
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:114:3924 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:114   state:D stack:0     pid:3924  tgid:3924  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4805d84 r8:00000002 r7:60000113 r6:e4805d8c r5:8474a400
 r4:8474a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8474a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4805e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85180780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8474a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa1d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513538c r4:85135000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8516e880 r8:8027ed34 r7:e4811e60 r6:8517cb00 r5:8474a400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:dffd5dc0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:115:3926 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:115   state:D stack:0     pid:3926  tgid:3926  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e4839d84 r8:00000002 r7:60000013 r6:e4839d8c r5:8474b000
 r4:8474b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8474b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4839e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851967c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8474b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0043000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513678c r4:85136400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513678c r4:8516e900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8474b000 r8:8516e92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8516e900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516e900 r8:8027ed34 r7:e4811e60 r6:8517cb80 r5:8474b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4839fb0 to 0xe4839ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85180840
INFO: task kworker/1:115:3926 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b42e0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:299:3928 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:299   state:D stack:0     pid:3928  tgid:3928  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e07a5d84 r8:00000002 r7:60000113 r6:e07a5d8c r5:8474bc00
 r4:8474bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8474bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ab80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8474bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0001000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505df8c r4:8505dc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505df8c r4:8517cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8474bc00 r8:8517cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r5:800d0113 r4:80239bd0
 r4:dffd5dc0
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:300:3929 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:300   state:D stack:0     pid:3929  tgid:3929  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e88d5d84 r8:00000002 r7:60000113 r6:e88d5d8c r5:8474c800
 r4:8474c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8474c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a600
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8474c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd05000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505d78c r4:8505d400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505d78c r4:8517cd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8474c800 r8:8517cd2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517cd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517cd00 r8:8027ed34 r7:e07a5e60 r6:8517cd80 r5:8474c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88d5fb0 to 0xe88d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518a200
INFO: task kworker/0:300:3929 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b4ad0000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:301:3932 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r4:00000000
 r9:83018005 r8:8474d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff39000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505db8c r4:8505d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505db8c r4:8517ce00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8474d400 r8:8517ce2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8517ce00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8517ce00 r8:8027ed34 r7:e07a5e60 r6:8517ce80 r5:8474d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf905fb0 to 0xdf905ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518a480
INFO: task kworker/0:301:3932 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r5:800d0113 r4:80239bd0
 r4:dffd5dc0
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88dde08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dfded000
 r5:85135b8c r4:85135800
 r10:61c88647 r9:8474e000 r8:8516e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:8516e980 r8:8027ed34 r7:e4839e60 r6:8517cf00 r5:8474e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88ddfb0 to 0xe88ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85196180
INFO: task kworker/1:116:3934 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b4f44000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:117   state:D stack:0     pid:3937  tgid:3937  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84760000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff13000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85135f8c r4:85135c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85135f8c r4:8516ea00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84760000 r8:8516ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8516ea00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516ea00 r8:8027ed34 r7:e4839e60 r6:8517cf80 r5:84760000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88e5fb0 to 0xe88e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85196240
INFO: task kworker/1:117:3937 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b50ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e9e08
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8516ea80
Exception stack(0xe88e9fb0 to 0xe88e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851962c0
INFO: task kworker/1:118:3938 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b551a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:302   state:D stack:0     pid:3941  tgid:3941  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:829185c4 r9:e88e1d84 r8:00000002 r7:60000113 r6:e88e1d8c r5:84761800
 r4:84761800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84761800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518bc40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84761800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfba7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505e78c r4:8505e400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505e78c r4:8518f080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84761800 r8:8518f0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518f080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518f080 r8:8027ed34 r7:e07a5e60 r6:8518f100 r5:84761800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88e1fb0 to 0xe88e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518aa00
INFO: task kworker/0:302:3941 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b57e3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r5:8587db8c r4:8587d800
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:303   state:D stack:0     pid:3942  tgid:3942  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e88d9d84 r8:00000002 r7:60000113 r6:e88d9d8c r5:84762400
 r4:84762400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84762400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518be80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84762400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e483d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505e38c r4:8505e000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505e38c r4:8518f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84762400 r8:8518f1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518f180 r8:8027ed34 r7:e88e1e60 r6:8518f200 r5:84762400
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:119:3945 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:119   state:D stack:0     pid:3945  tgid:3945  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e88f5d84 r8:00000002 r7:60000113 r6:e88f5d8c r5:84763c00
 r4:84763c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84763c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0095000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85136f8c r4:85136c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85136f8c r4:8516eb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84763c00 r8:8516eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8516eb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516eb00 r8:8027ed34 r7:e4839e60 r6:8518f280 r5:84763c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88f5fb0 to 0xe88f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851965c0
INFO: task kworker/1:119:3945 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b5e98000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:120:3947 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:120   state:D stack:0     pid:3947  tgid:3947  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea905d84 r8:00000002 r7:60000113 r6:ea905d8c r5:84763000
 r5:84763000 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea905e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196900
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84763000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e006d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85136b8c r4:85136800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85136b8c r4:8516eb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84763000 r8:8516ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8516eb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516eb80 r8:8027ed34 r7:e88f5e60 r6:8518f300 r5:84763000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea905fb0 to 0xea905ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85196780
INFO: task kworker/1:120:3947 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b6037000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:121   state:D stack:0     pid:3949  tgid:3949  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea90de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:84766000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
 r7:ddde2d40 r6:83018200 r5:8513778c r4:8516ec00
 r10:00000000 r9:8516ec00 r8:8027ed34 r7:e88f5e60 r6:8518f380 r5:84766000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b63c8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
INFO: task kworker/1:122:3950 blocked for more than 460 seconds.
 r10:829185c4 r9:ea911d84 r8:00000002 r7:60000013 r6:ea911d8c r5:84764800
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:84764800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
 r5:8513738c r4:85137000
 r4:8516ec80
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:123:3953 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:123   state:D stack:0     pid:3953  tgid:3953  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea921d84 r8:00000002 r7:60000113 r6:ea921d8c r5:84798c00
 r4:84798c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84798c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196e00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84798c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0409000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85137b8c r4:85137800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85137b8c r4:8516ed00
 r10:61c88647 r9:84798c00 r8:8516ed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xea921fb0 to 0xea921ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85196c00
INFO: task kworker/1:123:3953 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b692e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:124:3954 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:124   state:D stack:0     pid:3954  tgid:3954  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:829185c4 r9:ea925d84 r8:00000002 r7:60000113 r6:ea925d8c r5:84799800
 r4:84799800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84799800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea925e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518af00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84799800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e051f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513c38c r4:8513c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513c38c r4:8516ed80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84799800 r8:8516edac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8516ed80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516ed80 r8:8027ed34 r7:ea921e60 r6:8518f500 r5:84799800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r5:84798000 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018205 r8:84798000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04b1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85137f8c r4:85137c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85137f8c r4:8516ee00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84798000 r8:8516ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8516ee00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516ee00 r8:8027ed34 r7:ea925e60 r6:8518f580 r5:84798000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea92dfb0 to 0xea92dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85196e40
INFO: task kworker/1:125:3956 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b7571000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:126:3958 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:126   state:D stack:0     pid:3958  tgid:3958  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea935d84 r8:00000002 r7:60000113 r6:ea935d8c r5:8479a400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851960c0
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:8516ee80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516ee80 r8:8027ed34 r7:ea925e60 r6:8518f600 r5:8479a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea935fb0 to 0xea935ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85196d00
INFO: task kworker/1:126:3958 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b7821000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8479b000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea941e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179300
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8516ef00 r8:8027ed34 r7:ea925e60 r6:8518f680 r5:8479b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea941fb0 to 0xea941ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518af40
INFO: task kworker/1:127:3961 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b7a14000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ede08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:833aab80
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:8516ef80 r8:8027ed34 r7:ea941e60 r6:833a6b00 r5:8510a400
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85196e80
INFO: task kworker/1:128:3962 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b7c88000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:129:3965 blocked for more than 460 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea93de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:8510b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
 r7:ddde2d40 r6:83018200 r5:8513cb8c r4:833a6a00
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179000
INFO: task kworker/1:129:3965 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b7eb1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179500
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8510bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05d5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513d38c r4:8513d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513d38c r4:85174080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8510bc00 r8:851740ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85174080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85174080 r8:8027ed34 r7:ea941e60 r6:85174100 r5:8510bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea94dfb0 to 0xea94dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179240
INFO: task kworker/1:130:3967 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
5d60: 800d0113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:131:3968 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:131   state:D stack:0     pid:3968  tgid:3968  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea951d84 r8:00000002 r7:60000113 r6:ea951d8c r5:8510c800
 r4:8510c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8510c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8510c800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07a7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513d78c r4:8513d400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513d78c r4:85174180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8510c800 r8:851741ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85174180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85174180 r8:8027ed34 r7:ea94de60 r6:85174200 r5:8510c800
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:132:3971 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:132   state:D stack:0     pid:3971  tgid:3971  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea945d84 r8:00000002 r7:60000013 r6:ea945d8c r5:8510d400
 r4:8510d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8510d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851794c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8510d400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07f1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513db8c r4:8513d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513db8c r4:85174280
 r10:61c88647 r9:8510d400 r8:851742ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/1:133:3973 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:133   state:D stack:0     pid:3973  tgid:3973  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea955d84 r8:00000002 r7:60000113 r6:ea955d8c r5:8510e000
 r4:8510e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8510e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178ac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8510e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0767000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513eb8c r4:8513e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513eb8c r4:85174380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8510e000 r8:851743ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85174380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85174380 r8:8027ed34 r7:ea945e60 r6:85174400 r5:8510e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea955fb0 to 0xea955ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179680
INFO: task kworker/1:133:3973 is blocked on a mutex likely owned by task kworker/0:129:3505.
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:134:3974 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:134   state:D stack:0     pid:3974  tgid:3974  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e88f1d84 r8:00000002 r7:60000013 r6:e88f1d8c r5:8510ec00
 r4:8510ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8510ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
5d60: 800d0113 ffffffff
 r4:00000000
 r5:00001000 r4:eca19000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:135:3976 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:135   state:D stack:0     pid:3976  tgid:3976  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea961d84 r8:00000002 r7:60000113 r6:ea961d8c r5:85108c00
 r4:85108c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85108c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea961e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85108c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb6b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8513e78c r4:8513e400
 r4:85174580
 r10:00000000 r9:85174580 r8:8027ed34 r7:ea955e60 r6:85174600 r5:85108c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea961fb0 to 0xea961ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179800
INFO: task kworker/1:135:3976 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b96d7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r5:8474ec00 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518bb40
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:8518f700 r8:8027ed34 r7:e88e1e60 r6:85174680 r5:8474ec00
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b983b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:136:3983 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:136   state:D stack:0     pid:3983  tgid:3983  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:85110000
 r4:85110000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85110000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85110000 r8:8517472c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85174700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85174700 r8:8027ed34 r7:ea955e60 r6:85174780 r5:85110000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0699fb0 to 0xe0699ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179fc0
INFO: task kworker/1:136:3983 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:e06add84 r8:00000002 r7:60000013 r6:e06add8c r5:85110c00
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:8518f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518f780 r8:8027ed34 r7:e0665e60 r6:85174800 r5:85110c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06adfb0 to 0xe06adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518be00
INFO: task kworker/0:305:3984 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: b9cfc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r5:800d0113 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:306   state:D stack:0     pid:3985  tgid:3985  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b5c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85111800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc29000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505ef8c r4:8505ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505ef8c r4:8518f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85111800 r8:8518f82c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518f800 r8:8027ed34 r7:e06ade60 r6:85174880 r5:85111800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06cdfb0 to 0xe06cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:307:3988 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:307   state:D stack:0     pid:3988  tgid:3988  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea969d84 r8:00000002 r7:60000013 r6:ea969d8c r5:85113c00
 r4:85113c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85113c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b680
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85113c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc67000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505f38c r4:8505f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505f38c r4:8518f880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85113c00 r8:8518f8ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518f880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518f880 r8:8027ed34 r7:e06ade60 r6:85174900 r5:85113c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea969fb0 to 0xea969ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518b380
INFO: task kworker/0:307:3988 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:308:3990 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:308   state:D stack:0     pid:3990  tgid:3990  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea96dd84 r8:00000002 r7:60000113 r6:ea96dd8c r5:85114800
 r4:85114800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85114800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea96de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b0c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85114800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcaf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505f78c r4:8505f400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505f78c r4:8518f900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85114800 r8:8518f92c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518f900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518f900 r8:8027ed34 r7:e06ade60 r6:85174980 r5:85114800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea96dfb0 to 0xea96dff8)
dfa0:                                     00000000 00000000 00000000 00000000
 r4:8518b500
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:309:3992 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:309   state:D stack:0     pid:3992  tgid:3992  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea979d84 r8:00000002 r7:60000113 r6:ea979d8c r5:85115400
 r4:85115400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85115400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea979e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b140
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85115400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe43000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8505ff8c r4:8505fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8505ff8c r4:8518f980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r5:800d0113 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:310:3993 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:310   state:D stack:0     pid:3993  tgid:3993  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea97dd84 r8:00000002 r7:60000013 r6:ea97dd8c r5:85116000
 r4:85116000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85116000 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xea97dfb0 to 0xea97dff8)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:311:3995 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:311   state:D stack:0     pid:3995  tgid:3995  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea985d84 r8:00000002 r7:60000113 r6:ea985d8c r5:85112400
 r4:85112400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85112400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84947280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85112400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfec5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:840cd38c r4:840cd000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:840cd38c r4:8518fa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85112400 r8:8518faac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518fa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518fa80 r8:8027ed34 r7:ea97de60 r6:85174b00 r5:85112400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea985fb0 to 0xea985ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518b8c0
INFO: task kworker/0:311:3995 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bac61000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
      Not tainted 6.16.0-rc3-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r4:85116c00
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018005 r8:85116c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
 r10:61c88647 r9:85116c00 r8:8518fb2c r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xea98dfb0 to 0xea98dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517a080
INFO: task kworker/0:312:3997 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bb16a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:313:3999 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:313   state:D stack:0     pid:3999  tgid:3999  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r7:dddced40 r6:83018000 r5:8506c78c r4:8518fb80
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xea99dfb0 to 0xea99dff8)
 r4:8517a340
INFO: task kworker/0:314:4001 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bb77b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:61c88647 r9:8479d400 r8:8518fcac r7:82804d40 r6:dddced40 r5:dddced60
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bb77b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506d38c r4:8506d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506d38c r4:8518fd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8479e000 r8:8518fdac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518fd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518fd80 r8:8027ed34 r7:ea97de60 r6:8518fe00 r5:8479e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a1fb0 to 0xea9a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517a680
INFO: task kworker/0:316:4006 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bba29000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:317:4007 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:317   state:D stack:0     pid:4007  tgid:4007  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9a9d84 r8:00000002 r7:60000113 r6:ea9a9d8c r5:8479ec00
 r4:8479ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8479ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ab40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8479ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06db000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506df8c r4:8506dc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506df8c r4:8518fe80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8479ec00 r8:8518feac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518fe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518fe80 r8:8027ed34 r7:ea97de60 r6:8518ff00 r5:8479ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a9fb0 to 0xea9a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517a680
INFO: task kworker/0:317:4007 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bbd19000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:318:4010 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:318   state:D stack:0     pid:4010  tgid:4010  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:8479bc00
 r4:8479bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8479bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517aa00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8479bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06a9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506db8c r4:8506d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506db8c r4:8518ff80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8479bc00 r8:8518ffac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8518ff80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8518ff80 r8:8027ed34 r7:ea9a9e60 r6:8519a000 r5:8479bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9adfb0 to 0xea9adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517a880
INFO: task kworker/0:318:4010 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bc046000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:319:4012 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:319   state:D stack:0     pid:4012  tgid:4012  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:8479c800
 r4:8479c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8479c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517acc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8479c800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0703000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506e38c r4:8506e000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506e38c r4:8519a080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8479c800 r8:8519a0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519a080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519a080 r8:8027ed34 r7:ea9a9e60 r6:8519a100 r5:8479c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9b1fb0 to 0xea9b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517a9c0
INFO: task kworker/0:319:4012 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bc2f7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:320:4013 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:320   state:D stack:0     pid:4013  tgid:4013  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea965d84 r8:00000002 r7:60000013 r6:ea965d8c r5:84765400
 r4:84765400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84765400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517aec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84765400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e071d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506e78c r4:8506e400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506e78c r4:8519a180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84765400 r8:8519a1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519a180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519a180 r8:8027ed34 r7:ea9b1e60 r6:8519a200 r5:84765400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea965fb0 to 0xea965ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517aac0
INFO: task kworker/0:320:4013 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bc8a9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:321:4016 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:321   state:D stack:0     pid:4016  tgid:4016  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9b9d84 r8:00000002 r7:60000113 r6:ea9b9d8c r5:847f8c00
 r4:847f8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e4875000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506f38c r4:8506f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506f38c r4:8519a280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f8c00 r8:8519a2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519a280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519a280 r8:8027ed34 r7:ea965e60 r6:8519a300 r5:847f8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9b9fb0 to 0xea9b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8517ad40
INFO: task kworker/0:321:4016 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bcadf000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:322:4017 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:322   state:D stack:0     pid:4017  tgid:4017  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:847f9800
 r4:847f9800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f9800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e140
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:847f9800 r8:8519a3ac r7:82804d40 r6:dddced40 r5:dddced60
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
5d20: bcbc5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:323   state:D stack:0     pid:4020  tgid:4020  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9c1d84 r8:00000002 r7:60000113 r6:ea9c1d8c r5:847f8000
 r4:847f8000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f8000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0799000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506ef8c r4:8506ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506ef8c r4:8519a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f8000 r8:8519a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519a480 r8:8027ed34 r7:ea9b9e60 r6:8519a500 r5:847f8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9c1fb0 to 0xea9c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8519e1c0
INFO: task kworker/0:323:4020 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bcc85000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:137:4022 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:137   state:D stack:0     pid:4022  tgid:4022  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9b5d84 r8:00000002 r7:60000113 r6:ea9b5d8c r5:847fb000
 r4:847fb000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fb000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178000
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:847fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e88d1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d40 r6:83018200 r5:8513ef8c r4:85174d00
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bcfbb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e840
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e88a1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8506fb8c r4:8506f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8506fb8c r4:8519a600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fbc00 r8:8519a62c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519a600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519a600 r8:8027ed34 r7:ea9b9e60 r6:8519a680 r5:847fbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9c5fb0 to 0xea9c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8519e2c0
INFO: task kworker/0:324:4024 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:325:4026 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:325   state:D stack:0     pid:4026  tgid:4026  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9cdd84 r8:00000002 r7:60000113 r6:ea9cdd8c r5:847fd400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e580
 r5:8506f78c r4:8506f400
 r10:61c88647 r9:847fd400 r8:8519a72c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519a700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519a700 r8:8027ed34 r7:ea9c5e60 r6:8519a780 r5:847fd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9cdfb0 to 0xea9cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8519e500
INFO: task kworker/0:325:4026 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bd32c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r9:83018005 r8:847fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
 r10:61c88647 r9:847fc800 r8:8519a82c r7:82804d40 r6:dddced40 r5:dddced60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8519e6c0
INFO: task kworker/0:326:4028 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bd5fd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:847fec00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:8519a900 r8:8027ed34 r7:ea9d1e60 r6:8519a980 r5:847fec00
 r4:8519e6c0
Call trace: 
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a9580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8511a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa43000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513f38c r4:8513f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513f38c r4:85174d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8511a400 r8:85174dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85174d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85174d80 r8:8027ed34 r7:e0699e60 r6:85174e00 r5:8511a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9c9fb0 to 0xea9c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851785c0
INFO: task kworker/1:138:4031 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bde0d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:328:4034 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:328   state:D stack:0     pid:4034  tgid:4034  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa01d84 r8:00000002 r7:60000013 r6:eaa01d8c r5:8511b000
 r4:8511b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8511b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ef80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8511b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa07000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e4b8c r4:851e4800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e4b8c r4:8519aa00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9ddd84 r8:00000002 r7:60000013 r6:ea9ddd8c r5:847fe000
 r4:847fe000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fe000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9dde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ee40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:847fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9f7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e478c r4:851e4400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e478c r4:8519aa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fe000 r8:8519aaac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519aa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519aa80 r8:8027ed34 r7:eaa01e60 r6:8519ab00 r5:847fe000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9ddfb0 to 0xea9ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8519ec80
INFO: task kworker/0:329:4035 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: be49d000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:330:4038 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:330   state:D stack:0     pid:4038  tgid:4038  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9f5d84 r8:00000002 r7:60000013 r6:ea9f5d8c r5:847fa400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7040
 r5:851e538c r4:851e5000
 r10:00000000 r9:8519ab80 r8:8027ed34 r7:eaa01e60 r6:8519ac00 r5:847fa400
INFO: task kworker/0:330:4038 is blocked on a mutex likely owned by task kworker/0:129:3505.
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
 r5:8587db8c r4:8587d800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:84766c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178f80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84766c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa13000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e4f8c r4:851e4c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e4f8c r4:8519ac80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84766c00 r8:8519acac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519ac80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519ac80 r8:8027ed34 r7:ea9f5e60 r6:8519ad00 r5:84766c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e9fb0 to 0xea9e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8519e9c0
INFO: task kworker/0:331:4039 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: be8c2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:84b48100
task:kworker/0:332   state:D stack:0     pid:4041  tgid:4041  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84868000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa2b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e578c r4:851e5400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e578c r4:8519ad80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84868000 r8:8519adac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519ad80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519ad80 r8:8027ed34 r7:ea9f5e60 r6:8519ae00 r5:84868000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa11fb0 to 0xeaa11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a7080
INFO: task kworker/0:332:4041 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r5:800d0113 r4:80239bd0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:333   state:D stack:0     pid:4045  tgid:4045  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa1dd84 r8:00000002 r7:60000113 r6:eaa1dd8c r5:84868c00
 r4:84868c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84868c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa5b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e638c r4:851e6000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e638c r4:8519ae80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84868c00 r8:8519aeac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519ae80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519ae80 r8:8027ed34 r7:eaa11e60 r6:8519af00 r5:84868c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa1dfb0 to 0xeaa1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a7180
INFO: task kworker/0:333:4045 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d20: bf05b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:334   state:D stack:0     pid:4046  tgid:4046  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84869800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa37000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e5b8c r4:851e5800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e5b8c r4:8519af80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84869800 r8:8519afac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519af80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519af80 r8:8027ed34 r7:eaa1de60 r6:85174f00 r5:84869800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa35fb0 to 0xeaa35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a72c0
INFO: task kworker/0:334:4046 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bf268000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:335   state:D stack:0     pid:4048  tgid:4048  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa29d84 r8:00000002 r7:60000113 r6:eaa29d8c r5:8486a400
 r4:8486a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8486a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7680
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8486a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa4f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e5f8c r4:851e5c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:139:4049 blocked for more than 462 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:139   state:D stack:0     pid:4049  tgid:4049  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa4dd84 r8:00000002 r7:60000013 r6:eaa4dd8c r5:8511d400
 r4:8511d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8511d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7a80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8511d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa7f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e6b8c r4:851e6800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:851e6b8c r4:851ae080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8511d400 r8:851ae0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851ae080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851ae080 r8:8027ed34 r7:e0699e60 r6:851ae100 r5:8511d400
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:336:4052 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:336   state:D stack:0     pid:4052  tgid:4052  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa71d84 r8:00000002 r7:60000113 r6:eaa71d8c r5:8511bc00
 r4:8511bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8511bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7e40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8511bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaa3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e778c r4:851e7400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e778c r4:851b0080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8511bc00 r8:851b00ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0080 r8:8027ed34 r7:eaa1de60 r6:851ae180 r5:8511bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa71fb0 to 0xeaa71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a7580
INFO: task kworker/0:336:4052 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: bf9cb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r5:8511e000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:851b0100 r8:8027ed34 r7:eaa71e60 r6:851ae200 r5:8511e000
 r4:851a7580
Call trace: 
5d20: bfc68000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r4:00000000
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:338:4055 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:338   state:D stack:0     pid:4055  tgid:4055  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:85118000
 r4:85118000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85118000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85118000 r8:851b01ac r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
 r5:00001000 r4:eca19000
 r4:84b4a480
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:339   state:D stack:0     pid:4058  tgid:4058  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa95d84 r8:00000002 r7:60000013 r6:eaa95d8c r5:8511c800
 r4:8511c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8511c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7d00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8511c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa97000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e738c r4:851e7000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e738c r4:851b0200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8511c800 r8:851b022c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0200 r8:8027ed34 r7:eaa71e60 r6:851ae300 r5:8511c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa95fb0 to 0xeaa95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a7a40
INFO: task kworker/0:339:4058 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c08dd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:340   state:D stack:0     pid:4061  tgid:4061  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:851b0280 r8:8027ed34 r7:eaa71e60 r6:851ae380 r5:8511ec00
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a7cc0
INFO: task kworker/0:340:4061 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c0d87000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:84b4a480
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:829185c4 r9:eaa91d84 r8:00000002 r7:60000013 r6:eaa91d8c r5:8486bc00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
5d20: c1037000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:84b4a480
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:8486d400 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e9c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8486d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaab7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851e7f8c r4:851e7c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851e7f8c r4:851b0400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8486d400 r8:851b042c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0400 r8:8027ed34 r7:eaaade60 r6:851b0480 r5:8486d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa41fb0 to 0xeaa41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a7f00
INFO: task kworker/0:342:4064 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c1255000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8587db8c r4:8587d800
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08
 r5:00001000 r4:eaadb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ec78c r4:851ec400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ec78c r4:851b0500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8486b000 r8:851b052c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0500 r8:8027ed34 r7:eaaade60 r6:851b0580 r5:8486b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad1fb0 to 0xeaad1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bf040
INFO: task kworker/0:343:4067 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c1442000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
INFO: task kworker/1:140:4068 blocked for more than 462 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/1:141:4070 blocked for more than 462 seconds.
Call trace: 
 r5:85119800 r4:829185c0
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85119800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac2f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8529038c r4:85290000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8529038c r4:851ae500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85119800 r8:851ae52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851ae500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851ae500 r8:8027ed34 r7:eaa59e60 r6:851ae580 r5:85119800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad9fb0 to 0xeaad9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851a9d80
INFO: task kworker/1:141:4070 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c1dfd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:344:4072 blocked for more than 462 seconds.
 r10:829185c4 r9:eaae9d84 r8:00000002 r7:60000113 r6:eaae9d8c r5:85120000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf600
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85120000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ecb8c r4:851ec800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ecb8c r4:851b0600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85120000 r8:851b062c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0600 r8:8027ed34 r7:eaad1e60 r6:851ae600 r5:85120000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaae9fb0 to 0xeaae9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bf380
INFO: task kworker/0:344:4072 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c1fdd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:345:4074 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:345   state:D stack:0     pid:4074  tgid:4074  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:85121800
 r4:85121800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85121800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf900
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85121800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab07000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:345:4074 is blocked on a mutex likely owned by task kworker/0:129:3505.
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:346:4076 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:346   state:D stack:0     pid:4076  tgid:4076  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab05d84 r8:00000002 r7:60000013 r6:eab05d8c r5:85122400
 r4:85122400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85122400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf740
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85122400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaf7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ecf8c r4:851ecc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ecf8c r4:851b0700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85122400 r8:851b072c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0700 r8:8027ed34 r7:eab01e60 r6:851ae700 r5:85122400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab05fb0 to 0xeab05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bf5c0
INFO: task kworker/0:346:4076 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d60: 800d0113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:347:4077 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:347   state:D stack:0     pid:4077  tgid:4077  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:85123000
 r4:85123000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85123000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bfc00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85123000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab1f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851edb8c r4:851ed800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851edb8c r4:851b0780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85123000 r8:851b07ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0780 r8:8027ed34 r7:eab01e60 r6:851ae780 r5:85123000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab11fb0 to 0xeab11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bf840
INFO: task kworker/0:347:4077 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:8587db8c r4:8587d800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:348:4080 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:348   state:D stack:0     pid:4080  tgid:4080  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab1dd84 r8:00000002 r7:60000013 r6:eab1dd8c r5:85123c00
 r4:85123c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85123c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bfa40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab13000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ed78c r4:851ed400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ed78c r4:851b0800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85123c00 r8:851b082c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0800 r8:8027ed34 r7:eab11e60 r6:851ae800 r5:85123c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bf780
INFO: task kworker/0:348:4080 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c2bcd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:349:4082 blocked for more than 463 seconds.
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:eab33000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851edf8c r4:851edc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851edf8c r4:851b0880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85124800 r8:851b08ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0880 r8:8027ed34 r7:eab11e60 r6:851ae880 r5:85124800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab29fb0 to 0xeab29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bfa80
INFO: task kworker/0:349:4082 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c2fbc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:350:4085 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:350   state:D stack:0     pid:4085  tgid:4085  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:85126c00
 r4:85126c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85126c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a98c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85126c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9eb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851eeb8c r4:851ee800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85126c00 r8:851b092c r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:351:4087 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:351   state:D stack:0     pid:4087  tgid:4087  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05c9d84 r8:00000002 r7:60000113 r6:e05c9d8c r5:85120c00
 r4:85120c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85120c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bfe00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85120c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab3f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:352:4088 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:352   state:D stack:0     pid:4088  tgid:4088  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e88f9d84 r8:00000002 r7:60000013 r6:e88f9d8c r5:85126000
 r4:85126000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85126000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85126000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9b7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ee78c r4:851ee400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ee78c r4:851b0a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85126000 r8:851b0a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0a00 r8:8027ed34 r7:eab4de60 r6:851aea00 r5:85126000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe88f9fb0 to 0xe88f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85125400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a7cc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85125400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa55000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851eef8c r4:851eec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851eef8c r4:851b0a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85125400 r8:851b0aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0a80 r8:8027ed34 r7:eab4de60 r6:851aea80 r5:85125400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea919fb0 to 0xea919ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bff80
INFO: task kworker/0:353:4091 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c3ca5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:354:4093 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:354   state:D stack:0     pid:4093  tgid:4093  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab51d84 r8:00000002 r7:60000013 r6:eab51d8c r5:85109800
 r4:85109800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85109800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c6100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85109800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfadd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ef38c r4:851ef000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ef38c r4:851b0b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85109800 r8:851b0b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0b00 r8:8027ed34 r7:ea919e60 r6:851aeb00 r5:85109800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab51fb0 to 0xeab51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851bf0c0
INFO: task kworker/0:354:4093 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r4:82abe1e4
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:355:4095 blocked for more than 463 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08
 r4:00000000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:851c61c0
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08
 r5:00001000 r4:dfd49000
 r10:61c88647 r9:8486e000 r8:851b0cac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c44a2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:357:4100 blocked for more than 463 seconds.
task:kworker/0:357   state:D stack:0     pid:4100  tgid:4100  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dff11000
 r10:61c88647 r9:8486c800 r8:851b0dac r7:82804d40 r6:dddced40 r5:dddced60
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab55fb0 to 0xeab55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6080
INFO: task kworker/0:357:4100 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c4813000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dff47000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851f438c r4:851b0e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84830000 r8:851b0eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851b0e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851b0e80 r8:8027ed34 r7:eab55e60 r6:851b0f00 r5:84830000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab5dfb0 to 0xeab5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6080
INFO: task kworker/0:358:4101 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c4a5e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:8587db8c r4:8587d800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:359   state:D stack:0     pid:4103  tgid:4103  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:851b0f80 r8:8027ed34 r7:eab5de60 r6:851c4000 r5:84830c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab61fb0 to 0xeab61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6600
INFO: task kworker/0:359:4103 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c4c19000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:360   state:D stack:0     pid:4105  tgid:4105  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:dddced40 r6:83018000 r5:851f4b8c r4:851c4080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84831800 r8:851c40ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4080 r8:8027ed34 r7:eab61e60 r6:851c4100 r5:84831800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab65fb0 to 0xeab65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6700
INFO: task kworker/0:360:4105 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c4ee6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
 r5:8587db8c r4:8587d800
 r4:84b4a480
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:361:4107 blocked for more than 463 seconds.
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c6ac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0079000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851f4f8c r4:851f4c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851f4f8c r4:851c4180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84832400 r8:851c41ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4180 r8:8027ed34 r7:eab65e60 r6:851c4200 r5:84832400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab69fb0 to 0xeab69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6880
INFO: task kworker/0:361:4107 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c52ab000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:362:4110 blocked for more than 463 seconds.
 r10:829185c4 r9:eab59d84 r8:00000002 r7:60000013 r6:eab59d8c r5:84833c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bf280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e049d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851f5b8c r4:851f5800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851f5b8c r4:851c4280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84833c00 r8:851c42ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4280 r8:8027ed34 r7:eab69e60 r6:851c4300 r5:84833c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab59fb0 to 0xeab59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6a40
INFO: task kworker/0:362:4110 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c553a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:84834800 r8:851c43ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4380 r8:8027ed34 r7:eab59e60 r6:851c4400 r5:84834800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab71fb0 to 0xeab71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6b40
INFO: task kworker/0:363:4111 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c57df000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:364:4114 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:364   state:D stack:0     pid:4114  tgid:4114  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab75d84 r8:00000002 r7:60000113 r6:eab75d8c r5:84836000
 r4:84836000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84836000 r8:851c44ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:365:4115 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:365   state:D stack:0     pid:4115  tgid:4115  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab79d84 r8:00000002 r7:60000013 r6:eab79d8c r5:84836c00
 r4:84836c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84836c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0579000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851f678c r4:851f6400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851f678c r4:851c4580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84836c00 r8:851c45ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4580 r8:8027ed34 r7:eab59e60 r6:851c4600 r5:84836c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab79fb0 to 0xeab79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851d6000
INFO: task kworker/0:365:4115 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c5fea000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
 r5:00001000 r4:eca19000
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r5:851f5f8c r4:851f5c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851f5f8c r4:851c4680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84808000 r8:851c46ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:851d6200
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r5:8587db8c r4:8587d800
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08
 r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:800d0113 r4:80239bd0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:368:4122 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:368   state:D stack:0     pid:4122  tgid:4122  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab6dd84 r8:00000002 r7:60000013 r6:eab6dd8c r5:8521a400
 r4:8521a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8521a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6880
 r5:851f6b8c r4:851f6800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:851d6580
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:142:4123 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:142   state:D stack:0     pid:4123  tgid:4123  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:8521b000
 r4:8521b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8521b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r5:00001000 r4:eac1f000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c2d80
INFO: task kworker/1:142:4123 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c6924000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:369:4125 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:369   state:D stack:0     pid:4125  tgid:4125  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:8521bc00
 r4:8521bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8521bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6a80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8521bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4880 r8:8027ed34 r7:eab6de60 r6:851aed80 r5:8521bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab8dfb0 to 0xeab8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851d6680
INFO: task kworker/0:369:4125 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c6b4f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8587db8c r4:8587d800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
 r10:829185c4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:8521c800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d69c0
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851f6f8c r4:851f6c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851f6f8c r4:851c4900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8521c800 r8:851c492c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4900 r8:8027ed34 r7:eab8de60 r6:851aee00 r5:8521c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab91fb0 to 0xeab91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851d6680
INFO: task kworker/0:370:4126 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c70cc000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
      Not tainted 6.16.0-rc3-syzkaller #0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:800d0113 r4:80239bd0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:372:4131 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:372   state:D stack:0     pid:4131  tgid:4131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaba5d84 r8:00000002 r7:60000113 r6:eaba5d8c r5:85218000
 r4:85218000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85218000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852570c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85218000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabe3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fcf8c r4:851fcc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fcf8c r4:851c4a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85218000 r8:851c4a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4a00 r8:8027ed34 r7:eab9de60 r6:851aef00 r5:85218000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba5fb0 to 0xeaba5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851d6a40
INFO: task kworker/0:372:4131 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:8521e000
 r4:8521e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8521e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6c80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8521e000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea907000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fa0:                                     00000000 00000000 00000000 00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:374   state:D stack:0     pid:4134  tgid:4134  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:8521d400
 r4:8521d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8521d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6e80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8521d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea927000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851f7f8c r4:851f7c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851f7f8c r4:851c4b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8521d400 r8:851c4b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4b00 r8:8027ed34 r7:eaba5e60 r6:851ae000 r5:8521d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb1fb0 to 0xeabb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:375:4136 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:375   state:D stack:0     pid:4136  tgid:4136  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:85220c00
 r4:85220c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85220c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d6640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85220c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:851c4b80
 r4:00000001
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:376   state:D stack:0     pid:4138  tgid:4138  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:85220000
 r4:85220000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85220000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c6f40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:dffd5dc0
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:377:4140 blocked for more than 464 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:851c4c80 r8:8027ed34 r7:eaba5e60 r6:85256100 r5:85221800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabd9fb0 to 0xeabd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c2300
INFO: task kworker/0:377:4140 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c7f07000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:378:4142 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:378   state:D stack:0     pid:4142  tgid:4142  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:85222400
 r4:85222400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85222400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257740
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85222400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac27000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fdf8c r4:851fdc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fdf8c r4:851c4d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85222400 r8:851c4d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4d00 r8:8027ed34 r7:eaba5e60 r6:85256180 r5:85222400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabe1fb0 to 0xeabe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851c6c80
INFO: task kworker/0:378:4142 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c8518000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:379:4144 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:379   state:D stack:0     pid:4144  tgid:4144  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:85223000
 r4:85223000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85223000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85223000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabef000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fd38c r4:851fd000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fd38c r4:851c4d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85223000 r8:851c4dac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4d80 r8:8027ed34 r7:eabe1e60 r6:85256200 r5:85223000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf9fb0 to 0xeabf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852571c0
INFO: task kworker/0:379:4144 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c8518000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:380:4147 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:380   state:D stack:0     pid:4147  tgid:4147  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:85223c00
 r4:85223c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85223c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85223c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabff000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fd78c r4:851fd400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fd78c r4:851c4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:851c4e00
dfa0:                                     00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:381:4148 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:381   state:D stack:0     pid:4148  tgid:4148  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac19d84 r8:00000002 r7:60000013 r6:eac19d8c r5:85224800
 r4:85224800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85224800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85224800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac0f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fdb8c r4:851fd800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fdb8c r4:851c4e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85224800 r8:851c4eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4e80 r8:8027ed34 r7:eabe1e60 r6:85256300 r5:85224800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac19fb0 to 0xeac19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85257200
INFO: task kworker/0:381:4148 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c8b56000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:382:4149 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:382   state:D stack:0     pid:4149  tgid:4149  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:85226000
 r4:85226000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85226000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85226000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac57000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851feb8c r4:851fe800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851feb8c r4:851c4f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85226000 r8:851c4f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4f00 r8:8027ed34 r7:eabe1e60 r6:85256380 r5:85226000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac1dfb0 to 0xeac1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852573c0
INFO: task kworker/0:382:4149 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c8b56000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:143:4154 blocked for more than 464 seconds.
Workqueue: events bpf_prog_free_deferred
 r4:85226c00
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d0080
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85226c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfedb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85290f8c r4:85290c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85290f8c r4:85256400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85226c00 r8:8525642c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85256400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85256400 r8:8027ed34 r7:eaad9e60 r6:85256480 r5:85226c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab85fb0 to 0xeab85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85251f80
INFO: task kworker/1:143:4154 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c8fda000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:383:4155 blocked for more than 464 seconds.
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:85225400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85225400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac3b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fe38c r4:851fe000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fe38c r4:851c4f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85225400 r8:851c4fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851c4f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851c4f80 r8:8027ed34 r7:eac1de60 r6:85256500 r5:85225400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab95fb0 to 0xeab95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852576c0
INFO: task kworker/0:383:4155 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c9173000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85228c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac47000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fe78c r4:851fe400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fe78c r4:8525e000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85228c00 r8:8525e02c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e000 r8:8027ed34 r7:eac1de60 r6:85256580 r5:85228c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac55fb0 to 0xeac55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852578c0
INFO: task kworker/0:384:4158 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r4:82abe1e4
 r4:00000000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac6b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fef8c r4:851fec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fef8c r4:8525e080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85228000 r8:8525e0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e080 r8:8027ed34 r7:eac1de60 r6:85256600 r5:85228000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac65fb0 to 0xeac65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852579c0
INFO: task kworker/0:385:4160 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:8522a400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ff38c r4:851ff000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ff38c r4:8525e100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8522a400 r8:8525e12c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e100 r8:8027ed34 r7:eac65e60 r6:85256680 r5:8522a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac69fb0 to 0xeac69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852579c0
INFO: task kworker/0:386:4161 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:144   state:D stack:0     pid:4164  tgid:4164  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a380
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85229800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfea1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85290b8c r4:85290800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85290b8c r4:85256700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85229800 r8:8525672c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85256700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85256700 r8:8027ed34 r7:eab85e60 r6:85256780 r5:85229800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac85fb0 to 0xeac85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8526a040
INFO: task kworker/1:144:4164 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
5d60: 800d0113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:8587db8c r4:8587d800
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:387   state:D stack:0     pid:4165  tgid:4165  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac89d84 r8:00000002 r7:60000013 r6:eac89d8c r5:8522c800
 r4:8522c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8522c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526fa40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8522c800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb89000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520238c r4:85202000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520238c r4:8525e180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8522c800 r8:8525e1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e180 r8:8027ed34 r7:eac69e60 r6:85256800 r5:8522c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac89fb0 to 0xeac89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85257ac0
INFO: task kworker/0:387:4165 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: c9e27000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8587db8c r4:8587d800
 r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:388:4166 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:388   state:D stack:0     pid:4166  tgid:4166  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:8522b000
 r4:8522b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8522b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257f40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8522b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000
 r5:00001000 r4:eac8f000
 r10:61c88647 r9:8522b000 r8:8525e22c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85257c80
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:389   state:D stack:0     pid:4168  tgid:4168  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257500
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8522bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac9f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851ffb8c r4:851ff800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851ffb8c r4:8525e280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8522bc00 r8:8525e2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e280 r8:8027ed34 r7:eac89e60 r6:85256900 r5:8522bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac9dfb0 to 0xeac9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85257dc0
INFO: task kworker/0:389:4168 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ca361000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
 r5:8522d400 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8522d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacab000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:851fff8c r4:851ffc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:851fff8c r4:8525e300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8522d400 r8:8525e32c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e300 r8:8027ed34 r7:eac89e60 r6:85256980 r5:8522d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb5fb0 to 0xeacb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85251580
INFO: task kworker/0:390:4170 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
5d60: 800d0113 ffffffff
 r4:00000000
 r5:00001000 r4:eca19000
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:8522e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8522e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257f00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8522e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacbb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520038c r4:85200000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520038c r4:8525e380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8522e000 r8:8525e3ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e380 r8:8027ed34 r7:eac89e60 r6:85256a00 r5:8522e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacc9fb0 to 0xeacc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:eacd1d84 r8:00000002 r7:60000113 r6:eacd1d8c r5:85230000
 r4:85230000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85230000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526f040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85230000 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520078c r4:85200400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520078c r4:8525e400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85230000 r8:8525e42c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e400 r8:8027ed34 r7:eac89e60 r6:85256a80 r5:85230000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacd1fb0 to 0xeacd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85251980
INFO: task kworker/0:392:4174 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:8525e480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e480 r8:8027ed34 r7:eac89e60 r6:85256b00 r5:85231800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace5fb0 to 0xeace5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8526f080
INFO: task kworker/0:393:4176 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cad6f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
5d60: 800d0113 ffffffff
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:395:4180 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:395   state:D stack:0     pid:4180  tgid:4180  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead0dd84 r8:00000002 r7:60000113 r6:ead0dd8c r5:85232400
 r4:85232400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85232400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526f280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85232400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacf9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8520138c r4:85201000
 r10:00000000 r9:8525e580 r8:8027ed34 r7:eac89e60 r6:85256c00 r5:85232400
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:396:4182 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:396   state:D stack:0     pid:4182  tgid:4182  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:85233000
 r4:85233000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85233000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
 r5:8520178c r4:85201400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:8526f340
 r4:00000000
 r5:800d0113 r4:80239bd0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
task:kworker/0:397   state:D stack:0     pid:4185  tgid:4185  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e680 r8:8027ed34 r7:eac89e60 r6:85256d00 r5:85233c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead31fb0 to 0xead31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8526f580
INFO: task kworker/0:397:4185 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cb700000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:8526f580
INFO: task kworker/0:398:4186 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cb700000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:399:4189 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:399   state:D stack:0     pid:4189  tgid:4189  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9f1d84 r8:00000002 r7:60000013 r6:ea9f1d8c r5:85235400
 r4:85235400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85235400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8525e780 r8:8027ed34 r7:eac89e60 r6:85256e00 r5:85235400
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cbd99000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r4:00000000
 r5:8520338c r4:85203000
 r10:00000000 r9:8525e800 r8:8027ed34 r7:ea9f1e60 r6:8525e880 r5:84808c00
Workqueue: events bpf_prog_free_deferred
 r4:82abe1e4
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:401:4192 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:401   state:D stack:0     pid:4192  tgid:4192  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:8480b000
 r4:8480b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8480b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526fc80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8480b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc3d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85202b8c r4:85202800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85202b8c r4:8525e900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8480b000 r8:8525e92c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525e900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525e900 r8:8027ed34 r7:eac39e60 r6:8525e980 r5:8480b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac45fb0 to 0xeac45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8526f940
INFO: task kworker/0:401:4192 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:402:4195 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:402   state:D stack:0     pid:4195  tgid:4195  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9fdd84 r8:00000002 r7:60000013 r6:ea9fdd8c r5:8480bc00
 r4:8480bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8480bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526fe40
 r5:85202f8c r4:85202c00
 r10:00000000 r9:8525ea00 r8:8027ed34 r7:eac39e60 r6:8525ea80 r5:8480bc00
Workqueue: events bpf_prog_free_deferred
5d60: 800d0113 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:829185c4 r9:eaa31d84 r8:00000002 r7:60000113 r6:eaa31d8c r5:8480e000
 r9:83018205 r8:8480e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
 r10:00000000 r9:85256e80 r8:8027ed34 r7:eab85e60 r6:8525eb00 r5:8480e000
 r4:00000000
 r4:dffd5dc0
 r5:00001000 r4:eca19000
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:146:4200 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:146   state:D stack:0     pid:4200  tgid:4200  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa0dd84 r8:00000002 r7:60000113 r6:eaa0dd8c r5:85236000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:848d0240
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa05d84 r8:00000002 r7:60000113 r6:eaa05d8c r5:85236c00
 r4:85236c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85236c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852844c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0601000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85203b8c r4:85203800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85203b8c r4:8525eb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85236c00 r8:8525ebac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525eb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525eb80 r8:8027ed34 r7:eac39e60 r6:85289000 r5:85236c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa05fb0 to 0xeaa05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:404:4204 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:404   state:D stack:0     pid:4204  tgid:4204  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa3dd84 r8:00000002 r7:60000013 r6:eaa3dd8c r5:85219800
 r5:85219800 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284340
 r5:8520378c r4:85203400
 r10:00000000 r9:8525ec00 r8:8027ed34 r7:eaa05e60 r6:85289080 r5:85219800
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
      Not tainted 6.16.0-rc3-syzkaller #0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa55d84 r8:00000002 r7:60000013 r6:eaa55d8c r5:85238000
 r4:85238000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85238000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85238000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e062d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85203f8c r4:85203c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85203f8c r4:8525ec80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85238000 r8:8525ecac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:8525ec80 r8:8027ed34 r7:eaa05e60 r6:85289100 r5:85238000
Workqueue: events bpf_prog_free_deferred
 r4:82abe1e4
 r4:00000000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:829185c4 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:85239800
 r4:85239800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85239800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284a40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85239800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0715000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85204b8c r4:85204800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85204b8c r4:8525ed00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85239800 r8:8525ed2c r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852846c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e066b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520438c r4:85204000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520438c r4:8525ed80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85238c00 r8:8525edac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525ed80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525ed80 r8:8027ed34 r7:eaa65e60 r6:85289200 r5:85238c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa85fb0 to 0xeaa85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85284540
INFO: task kworker/0:407:4210 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cd907000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:829185c4 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:8523b000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85284540
INFO: task kworker/0:408:4211 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cda80000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08
 r5:00001000 r4:e0785000
 r4:00000001
Workqueue: events bpf_prog_free_deferred
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286000
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8523c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa89000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8529178c r4:85291400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8529178c r4:85289380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8523c800 r8:852893ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85289380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85289380 r8:8027ed34 r7:eaa31e60 r6:85289400 r5:8523c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa9dfb0 to 0xeaa9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85286540
INFO: task kworker/1:147:4215 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r5:800d0113 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r10:829185c4 r9:eaaa9d84 r8:00000002 r7:60000013 r6:eaaa9d8c r5:8523d400
 r4:8523d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8523d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284bc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8523d400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0769000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85204f8c r4:85204c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85204f8c r4:8525ef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8523d400 r8:8525ef2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8525ef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8525ef00 r8:8027ed34 r7:eaa25e60 r6:85289480 r5:8523d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa9fb0 to 0xeaaa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852849c0
INFO: task kworker/0:410:4217 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: ce85f000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:411:4220 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:411   state:D stack:0     pid:4220  tgid:4220  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:8523e000
 r4:8523e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8523e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284e00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r5:00001000 r4:e4873000
 r5:8520578c r4:85205400
 r10:61c88647 r9:8523e000 r8:8525efac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:8525ef80 r8:8027ed34 r7:eaa25e60 r6:85289500 r5:8523e000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:85284980
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:412:4222 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:412   state:D stack:0     pid:4222  tgid:4222  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:8523a400
 r4:8523a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8523a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284b00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8523a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e88bd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85205f8c r4:85205c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85205f8c r4:85288000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8523a400 r8:8528802c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288000 r8:8027ed34 r7:eaac5e60 r6:85289580 r5:8523a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaae1fb0 to 0xeaae1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85284c00
INFO: task kworker/0:412:4222 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cf0ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:413:4225 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:413   state:D stack:0     pid:4225  tgid:4225  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:85240c00
 r4:85240c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85240c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8897000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85240c00 r8:852880ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288080 r8:8027ed34 r7:eaae1e60 r6:85289600 r5:85240c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab0dfb0 to 0xeab0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85284d40
INFO: task kworker/0:413:4225 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cf2f9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:414:4226 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:414   state:D stack:0     pid:4226  tgid:4226  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab19d84 r8:00000002 r7:60000013 r6:eab19d8c r5:85241800
 r4:85241800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85241800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85241800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea95d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520638c r4:85206000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520638c r4:85288100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85241800 r8:8528812c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288100 r8:8027ed34 r7:eaae1e60 r6:85289680 r5:85241800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab19fb0 to 0xeab19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d080
INFO: task kworker/0:414:4226 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cf633000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:415:4228 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:415   state:D stack:0     pid:4228  tgid:4228  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:85243000
 r4:85243000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85243000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85243000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa09000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520738c r4:85207000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520738c r4:85288180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85243000 r8:852881ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288180 r8:8027ed34 r7:eab19e60 r6:85289700 r5:85243000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab39fb0 to 0xeab39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d080
INFO: task kworker/0:415:4228 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: cfd70000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85240000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea981000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520678c r4:85206400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520678c r4:85288200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85240000 r8:8528822c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288200 r8:8027ed34 r7:eab39e60 r6:85289780 r5:85240000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab45fb0 to 0xeab45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d080
INFO: task kworker/0:416:4229 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:417:4231 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:417   state:D stack:0     pid:4231  tgid:4231  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:8480ec00
 r4:8480ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8480ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d480
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8480ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea991000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85206b8c r4:85206800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85206b8c r4:85288280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8480ec00 r8:852882ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288280 r8:8027ed34 r7:eab39e60 r6:85288300 r5:8480ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa6dfb0 to 0xeaa6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d1c0
INFO: task kworker/0:417:4231 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
5d60: 800d0113 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8587db8c r4:8587d800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:418:4234 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:418   state:D stack:0     pid:4234  tgid:4234  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead39d84 r8:00000002 r7:60000013 r6:ead39d8c r5:8480d400
 r4:8480d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8480d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead39e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d600
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8480d400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9a5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85206f8c r4:85206c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85206f8c r4:85288380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8480d400 r8:852883ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288380 r8:8027ed34 r7:eab39e60 r6:85288400 r5:8480d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead39fb0 to 0xead39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d300
INFO: task kworker/0:418:4234 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d02d8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:419:4237 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:419   state:D stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead3dd84 r8:00000002 r7:60000013 r6:ead3dd8c r5:8480c800
 r4:8480c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8480c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85284d40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8480c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaab9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521038c r4:85210000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521038c r4:85288480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8480c800 r8:852884ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288480 r8:8027ed34 r7:eab39e60 r6:85288500 r5:8480c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead3dfb0 to 0xead3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d580
INFO: task kworker/0:419:4237 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d0521000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:420:4238 blocked for more than 465 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead45d84 r8:00000002 r7:60000013 r6:ead45d8c r5:8480a400
 r4:8480a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8480a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8480a400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa39000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520778c r4:85207400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520778c r4:85288580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8480a400 r8:852885ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288580 r8:8027ed34 r7:ead3de60 r6:85288600 r5:8480a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead45fb0 to 0xead45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d680
INFO: task kworker/0:420:4238 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d07eb000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:421:4239 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:421   state:D stack:0     pid:4239  tgid:4239  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead61d84 r8:00000002 r7:60000013 r6:ead61d8c r5:84833000
 r4:84833000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84833000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528da00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa69000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85207b8c r4:85207800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85207b8c r4:85288680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84833000 r8:852886ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288680 r8:8027ed34 r7:ead3de60 r6:85288700 r5:84833000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead61fb0 to 0xead61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528d680
INFO: task kworker/0:421:4239 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d0d21000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:148:4242 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:148   state:D stack:0     pid:4242  tgid:4242  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead69d84 r8:00000002 r7:60000013 r6:ead69d8c r5:84809800
 r4:84809800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84809800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84809800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0591000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85292f8c r4:85292c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85292f8c r4:85289800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84809800 r8:8528982c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85289800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
 r5:00001000 r4:eca19000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:149:4244 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:149   state:D stack:0     pid:4244  tgid:4244  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:84828c00
 r4:84828c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84828c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286f40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84828c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fa0:                                     00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:422:4246 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:422   state:D stack:0     pid:4246  tgid:4246  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead6dd84 r8:00000002 r7:60000113 r6:ead6dd8c r5:84829800
 r4:84829800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84829800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de180
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84829800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab09000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85210b8c r4:85210800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85210b8c r4:85288880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84829800 r8:852888ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288880 r8:8027ed34 r7:ead3de60 r6:85288900 r5:84829800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead6dfb0 to 0xead6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8528df80
INFO: task kworker/0:422:4246 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d1734000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:423:4247 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:423   state:D stack:0     pid:4247  tgid:4247  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa49d84 r8:00000002 r7:60000013 r6:eaa49d8c r5:8482a400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
 r5:00001000 r4:eaac9000
 r5:8521078c r4:85210400
 r7:dddced40 r6:83018000 r5:8521078c r4:85288980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:424:4249 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:424   state:D stack:0     pid:4249  tgid:4249  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:8482b000
 r4:8482b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de500
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8482b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead29000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85210f8c r4:85210c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85210f8c r4:85288a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482b000 r8:85288aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288a80 r8:8027ed34 r7:ead6de60 r6:85288b00 r5:8482b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead65fb0 to 0xead65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852de000
INFO: task kworker/0:424:4249 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d1924000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:425:4252 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:425   state:D stack:0     pid:4252  tgid:4252  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead95d84 r8:00000002 r7:60000013 r6:ead95d8c r5:8482d400
 r4:8482d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de6c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8482d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead8d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521138c r4:85211000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521138c r4:85288b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482d400 r8:85288bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288b80 r8:8027ed34 r7:ead65e60 r6:85288c00 r5:8482d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead95fb0 to 0xead95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852de440
INFO: task kworker/0:425:4252 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d1f56000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:426:4255 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:426   state:D stack:0     pid:4255  tgid:4255  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead89d84 r8:00000002 r7:60000113 r6:ead89d8c r5:8482bc00
 r4:8482bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de7c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8482bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eada1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521178c r4:85211400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521178c r4:85288c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482bc00 r8:85288cac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288c80 r8:8027ed34 r7:ead95e60 r6:85288d00 r5:8482bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead89fb0 to 0xead89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852de440
INFO: task kworker/0:426:4255 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d25e1000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:427:4257 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:427   state:D stack:0     pid:4257  tgid:4257  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadb5d84 r8:00000002 r7:60000013 r6:eadb5d8c r5:8482e000
 r4:8482e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852de980
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8482e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadbd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85211b8c r4:85211800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85211b8c r4:85288d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482e000 r8:85288dac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288d80 r8:8027ed34 r7:ead89e60 r6:85288e00 r5:8482e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb5fb0 to 0xeadb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852de5c0
INFO: task kworker/0:427:4257 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d2949000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:428:4259 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:428   state:D stack:0     pid:4259  tgid:4259  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadd1d84 r8:00000002 r7:60000113 r6:eadd1d8c r5:8482ec00
 r4:8482ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dec80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8482ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eade1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521238c r4:85212000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521238c r4:85288e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482ec00 r8:85288eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288e80 r8:8027ed34 r7:eadb5e60 r6:85288f00 r5:8482ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd1fb0 to 0xeadd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:852de800
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:429:4260 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:429   state:D stack:0     pid:4260  tgid:4260  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead75d84 r8:00000002 r7:60000113 r6:ead75d8c r5:8482c800
 r4:8482c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852deb00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadd5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85211f8c r4:85211c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85211f8c r4:85288f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482c800 r8:85288fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85288f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85288f80 r8:8027ed34 r7:eadd1e60 r6:852d4000 r5:8482c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead75fb0 to 0xead75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852deac0
INFO: task kworker/0:429:4260 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d2fa3000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:430:4263 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:430   state:D stack:0     pid:4263  tgid:4263  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:84828000
 r4:84828000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84828000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852defc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84828000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadf9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85212b8c r4:85212800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85212b8c r4:852d4080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84828000 r8:852d40ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4080 r8:8027ed34 r7:eadd1e60 r6:852d4100 r5:84828000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd9fb0 to 0xeadd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852de880
INFO: task kworker/0:430:4263 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d31bd000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:431:4265 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:431   state:D stack:0     pid:4265  tgid:4265  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:84835400
 r4:84835400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84835400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dee40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84835400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaded000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521278c r4:85212400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521278c r4:852d4180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84835400 r8:852d41ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4180 r8:8027ed34 r7:eadd9e60 r6:852d4200 r5:84835400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf1fb0 to 0xeadf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852de880
INFO: task kworker/0:431:4265 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d3556000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:150:4266 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:150   state:D stack:0     pid:4266  tgid:4266  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:84878000
 r4:84878000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84878000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dde00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84878000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9f9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8529238c r4:85292000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8529238c r4:85289900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84878000 r8:8528992c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85289900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85289900 r8:8027ed34 r7:ead69e60 r6:852d4280 r5:84878000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade5fb0 to 0xeade5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852dd380
INFO: task kworker/1:150:4266 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d3863000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:432:4269 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:432   state:D stack:0     pid:4269  tgid:4269  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:84878c00
 r4:84878c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84878c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae15000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521338c r4:85213000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521338c r4:852d4300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84878c00 r8:852d432c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4300 r8:8027ed34 r7:eadd9e60 r6:852d4380 r5:84878c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadfdfb0 to 0xeadfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85286a40
INFO: task kworker/0:432:4269 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d3863000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:433:4270 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:433   state:D stack:0     pid:4270  tgid:4270  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae0dd84 r8:00000002 r7:60000013 r6:eae0dd8c r5:84879800
 r4:84879800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84879800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84879800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae05000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85212f8c r4:85212c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85212f8c r4:852d4400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84879800 r8:852d442c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4400 r8:8027ed34 r7:eadfde60 r6:852d4480 r5:84879800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae0dfb0 to 0xeae0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e3040
INFO: task kworker/0:433:4270 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d3bda000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
INFO: task kworker/0:434:4272 blocked for more than 466 seconds.
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8487a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae39000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85213f8c r4:85213c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85213f8c r4:852d4500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487a400 r8:852d452c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4500 r8:8027ed34 r7:eadfde60 r6:852d4580 r5:8487a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae19fb0 to 0xeae19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e3040
INFO: task kworker/0:434:4272 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d3fc6000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:435:4273 blocked for more than 466 seconds.
Workqueue: events bpf_prog_free_deferred
 r5:8487b000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3380
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8487b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae21000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521378c r4:85213400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521378c r4:852d4600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487b000 r8:852d462c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4600 r8:8027ed34 r7:eae19e60 r6:852d4680 r5:8487b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae25fb0 to 0xeae25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e32c0
INFO: task kworker/0:435:4273 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d42b5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:436:4277 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:436   state:D stack:0     pid:4277  tgid:4277  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:8487bc00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85213b8c r4:85213800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85213b8c r4:852d4700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487bc00 r8:852d472c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4700 r8:8027ed34 r7:eae19e60 r6:852d4780 r5:8487bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae31fb0 to 0xeae31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e3300
INFO: task kworker/0:436:4277 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d42b5000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:437:4278 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:437   state:D stack:0     pid:4278  tgid:4278  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:8487c800
 r4:8487c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8487c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3a40
 r4:00000000
 r5:00001000 r4:eae55000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:dddced40 r6:83018000 r5:8530c78c r4:852d4800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487c800 r8:852d482c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4800 r8:8027ed34 r7:eae19e60 r6:852d4880 r5:8487c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae3dfb0 to 0xeae3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e34c0
INFO: task kworker/0:437:4278 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d47ea000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:438:4279 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:438   state:D stack:0     pid:4279  tgid:4279  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:8487d400
 r4:8487d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8487d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e34c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8487d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae45000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530c38c r4:8530c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530c38c r4:852d4900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487d400 r8:852d492c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4900 r8:8027ed34 r7:eae3de60 r6:852d4980 r5:8487d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae4dfb0 to 0xeae4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e34c0
INFO: task kworker/0:438:4279 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d4c86000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:8487e000
 r4:8487e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8487e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3e80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8487e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae79000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530d38c r4:8530d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530d38c r4:852d4a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487e000 r8:852d4a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4a00 r8:8027ed34 r7:eae3de60 r6:852d4a80 r5:8487e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae49fb0 to 0xeae49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e3900
INFO: task kworker/0:439:4282 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d4c86000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:440   state:D stack:0     pid:4284  tgid:4284  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3b80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8487ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae61000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530cb8c r4:8530c800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530cb8c r4:852d4b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487ec00 r8:852d4b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4b00 r8:8027ed34 r7:eae49e60 r6:852d4b80 r5:8487ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae65fb0 to 0xeae65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852e3ac0
INFO: task kworker/0:440:4284 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d53ef000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:82abe1e4
 r4:00000000
 r5:00001000 r4:eca19000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r5:84560000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e3d40
 r7:dddced40 r6:83018000 r5:8530cf8c r4:852d4c00
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d53ef000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:442:4288 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:442   state:D stack:0     pid:4288  tgid:4288  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae59d84 r8:00000002 r7:60000013 r6:eae59d8c r5:84561800
 r4:84561800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84561800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5480
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84561800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdd5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530df8c r4:8530dc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530df8c r4:852d4d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84561800 r8:852d4d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4d00 r8:8027ed34 r7:eae49e60 r6:852d4d80 r5:84561800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae59fb0 to 0xeae59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
 r4:852e3c80
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:8587db8c r4:8587d800
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:443:4289 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:443   state:D stack:0     pid:4289  tgid:4289  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:84560c00
 r4:84560c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84560c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f51c0
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeabc5fb0 to 0xeabc5ff8)
 r4:852e3dc0
Workqueue: events bpf_prog_free_deferred
5d60: 800d0113 ffffffff
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:444:4293 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:444   state:D stack:0     pid:4293  tgid:4293  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:84563000
 r4:84563000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84563000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84563000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb39000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530db8c r4:8530d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530db8c r4:852d4f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84563000 r8:852d4f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852d4f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852d4f00 r8:8027ed34 r7:eae59e60 r6:852d4f80 r5:84563000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabcdfb0 to 0xeabcdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:82abe1e4
 r4:00000000
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:445:4296 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:445   state:D stack:0     pid:4296  tgid:4296  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae7dd84 r8:00000002 r7:60000013 r6:eae7dd8c r5:84563c00
 r4:84563c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84563c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dff29000
 r10:61c88647 r9:84563c00 r8:852f302c r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:151:4297 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:151   state:D stack:0     pid:4297  tgid:4297  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:84564800
 r4:84564800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84564800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
dfa0:                                     00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84565400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84565400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e000d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530e78c r4:8530e400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530e78c r4:852f3180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84565400 r8:852f31ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3180 r8:8027ed34 r7:eae7de60 r6:852f3200 r5:84565400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabd5fb0 to 0xeabd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852f5440
INFO: task kworker/0:446:4300 is blocked on a mutex likely owned by task kworker/0:129:3505.
 r4:00000000
 r4:82abe1e4
 r4:00000000
 r5:8587db8c r4:8587d800
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
INFO: task kworker/0:447:4301 blocked for more than 466 seconds.
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabe9d84 r8:00000002 r7:60000013 r6:eabe9d8c r5:84566000
 r4:84566000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84566000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f59c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84566000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0093000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530eb8c r4:8530e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530eb8c r4:852f3280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84566000 r8:852f32ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3280 r8:8027ed34 r7:eabd5e60 r6:852f3300 r5:84566000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:84b48100
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5ac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85245400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00c9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530ef8c r4:8530ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530ef8c r4:852f3380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85245400 r8:852f33ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3380 r8:8027ed34 r7:eabe9e60 r6:85289a00 r5:85245400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf5fb0 to 0xeabf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852f5a00
INFO: task kworker/0:448:4304 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d69ad000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:152   state:D stack:0     pid:4306  tgid:4306  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305200
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0531000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85292b8c r4:85292800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85292b8c r4:85289a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85243c00 r8:85289aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85289a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85289a80 r8:8027ed34 r7:ead69e60 r6:85289b00 r5:85243c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac05fb0 to 0xeac05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852dd440
INFO: task kworker/1:152:4306 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d69ad000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8587db8c r4:8587d800
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:449:4307 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:449   state:D stack:0     pid:4307  tgid:4307  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac09d84 r8:00000002 r7:60000013 r6:eac09d8c r5:85242400
 r4:85242400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85242400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85242400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea931000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:852f3400 r8:8027ed34 r7:eabf5e60 r6:85289b80 r5:85242400
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
5d20: d72ac000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:450:4308 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:450   state:D stack:0     pid:4308  tgid:4308  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:85246c00
 r4:85246c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85246c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:852f3480 r8:8027ed34 r7:eac09e60 r6:85289c00 r5:85246c00
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d76d9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8587db8c r4:8587d800
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:451   state:D stack:0     pid:4310  tgid:4310  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530f78c r4:8530f400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530f78c r4:852f3500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85244800 r8:852f352c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3500 r8:8027ed34 r7:eac09e60 r6:85289c80 r5:85244800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac2dfb0 to 0xeac2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852f5a40
INFO: task kworker/0:451:4310 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d76d9000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84b4a480
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ddf00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85246000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07fb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530fb8c r4:8530f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530fb8c r4:852f3580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85246000 r8:852f35ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3580 r8:8027ed34 r7:eac09e60 r6:85289d00 r5:85246000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac35fb0 to 0xeac35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852f5d80
INFO: task kworker/0:452:4311 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d7c1b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/1:153:4314 blocked for more than 466 seconds.
 r4:8522ec00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85308ac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8522ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaccb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:842f3b8c r4:842f3800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:842f3b8c r4:85289d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8522ec00 r8:85289dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85289d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85289d80 r8:8027ed34 r7:ead69e60 r6:85289e00 r5:8522ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabfdfb0 to 0xeabfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85305100
INFO: task kworker/1:153:4314 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d7c1b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:154   state:D stack:0     pid:4316  tgid:4316  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:e05ed000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8529338c r4:85293000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8529338c r4:85289e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8523ec00 r8:85289eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85289e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85289e80 r8:8027ed34 r7:eabfde60 r6:85289f00 r5:8523ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabedfb0 to 0xeabedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85305100
INFO: task kworker/1:154:4316 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d7f79000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84b4a480
5fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
 r10:829185c4 r9:eac41d84 r8:00000002 r7:60000113 r6:eac41d8c r5:85248000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85248000 r8:85289fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac41fb0 to 0xeac41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85305380
INFO: task kworker/1:155:4318 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d8570000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:453:4320 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:453   state:D stack:0     pid:4320  tgid:4320  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:829185c4 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:85248c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e4857000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8530ff8c r4:8530fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8530ff8c r4:852f3600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85248c00 r8:852f362c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3600 r8:8027ed34 r7:eac09e60 r6:852ff080 r5:85248c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac5dfb0 to 0xeac5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fd080
INFO: task kworker/0:453:4320 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d883e000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:454   state:D stack:0     pid:4324  tgid:4324  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaad3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531878c r4:85318400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531878c r4:852f3680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8524a400 r8:852f36ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3680 r8:8027ed34 r7:eac09e60 r6:852ff100 r5:8524a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac71fb0 to 0xeac71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fd280
INFO: task kworker/0:454:4324 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d8b74000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:156:4326 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:156   state:D stack:0     pid:4326  tgid:4326  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac7dd84 r8:00000002 r7:60000113 r6:eac7dd8c r5:8524bc00
 r4:8524bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8524bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8524bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabb3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531938c r4:85319000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8531938c r4:852ff180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r4:82abe1e4
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:85318b8c r4:852f3700
Exception stack(0xeac99fb0 to 0xeac99ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b4a480
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:456:4329 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:456   state:D stack:0     pid:4329  tgid:4329  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:85249800
 r4:85249800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85249800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85249800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eace9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531af8c r4:8531ac00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531af8c r4:852f3780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85249800 r8:852f37ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3780 r8:8027ed34 r7:eac99e60 r6:852ff300 r5:85249800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca5fb0 to 0xeaca5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fd3c0
INFO: task kworker/0:456:4329 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d92f2000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:457   state:D stack:0     pid:4330  tgid:4330  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8524e000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab9f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85318f8c r4:85318c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85318f8c r4:852f3800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8524e000 r8:852f382c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3800 r8:8027ed34 r7:eaca5e60 r6:852ff380 r5:8524e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb1fb0 to 0xeacb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fd3c0
INFO: task kworker/0:457:4330 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d9575000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
5fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:157   state:D stack:0     pid:4333  tgid:4333  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:eac21000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85293b8c r4:85293800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85293b8c r4:852ff400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8524ec00 r8:852ff42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:852ff400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff400 r8:8027ed34 r7:eabfde60 r6:852ff480 r5:8524ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacf1fb0 to 0xeacf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85305cc0
INFO: task kworker/1:157:4333 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d9637000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:458:4335 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:458   state:D stack:0     pid:4335  tgid:4335  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead01d84 r8:00000002 r7:60000013 r6:ead01d8c r5:8524b000
 r4:8524b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8524b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fda80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8524b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabe5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531978c r4:85319400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531978c r4:852f3880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8524b000 r8:852f38ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3880 r8:8027ed34 r7:eaca5e60 r6:852ff500 r5:8524b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead01fb0 to 0xead01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fd900
INFO: task kworker/0:458:4335 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:459:4336 blocked for more than 467 seconds.
 r4:84a38000
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdb80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a38000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac31000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85319b8c r4:85319800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85319b8c r4:852f3900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a38000 r8:852f392c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3900 r8:8027ed34 r7:eaca5e60 r6:852ff580 r5:84a38000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead11fb0 to 0xead11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fd900
INFO: task kworker/0:459:4336 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: d9f48000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:460:4339 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:460   state:D stack:0     pid:4339  tgid:4339  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdd00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac51000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85319f8c r4:85319c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85319f8c r4:852f3980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a38c00 r8:852f39ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3980 r8:8027ed34 r7:eaca5e60 r6:852ff600 r5:84a38c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead21fb0 to 0xead21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fdac0
INFO: task kworker/0:460:4339 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
Exception stack(0xdffd5d20 to 0xdffd5d68)
 r4:dffd5dc0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:158   state:D stack:0     pid:4340  tgid:4340  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae89d84 r8:00000002 r7:60000113 r6:eae89d8c r5:84a3a400
 r4:84a3a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a3a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85308a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84a3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacb9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:ddde2d40 r6:83018200 r5:85293f8c r4:852ff680
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xdffd5d20 to 0xdffd5d68)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:461:4342 blocked for more than 467 seconds.
 r10:829185c4 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:84a39800
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a39800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac7f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531a38c r4:8531a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531a38c r4:852f3a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a39800 r8:852f3a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3a00 r8:8027ed34 r7:eaca5e60 r6:852ff780 r5:84a39800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae91fb0 to 0xeae91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fdb00
INFO: task kworker/0:461:4342 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: da6b7000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b48100
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:463:4346 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:463   state:D stack:0     pid:4346  tgid:4346  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaea1d84 r8:00000002 r7:60000013 r6:eaea1d8c r5:84a3bc00
 r4:84a3bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a3bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd9000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:852f3b00 r8:8027ed34 r7:eaca5e60 r6:852ff880 r5:84a3bc00
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:eca19000
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:159:4348 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:159   state:D stack:0     pid:4348  tgid:4348  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae9dd84 r8:00000002 r7:60000113 r6:eae9dd8c r5:84a3b000
 r4:84a3b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a3b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9fc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84a3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadf3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544938c r4:85449000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8544938c r4:852ff900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a3b000 r8:852ff92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:852ff900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852ff900 r8:8027ed34 r7:eabfde60 r6:852ff980 r5:84a3b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae9dfb0 to 0xeae9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85308940
INFO: task kworker/1:159:4348 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:160:4350 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:160   state:D stack:0     pid:4350  tgid:4350  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:84a3e000
 r4:84a3e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a3e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ef280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab35000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r4:85308940
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:82abe1e4
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
INFO: task kworker/0:464:4353 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:464   state:D stack:0     pid:4353  tgid:4353  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaea5d84 r8:00000002 r7:60000113 r6:eaea5d8c r5:84a3ec00
 r4:84a3ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a3ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead05000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531b38c r4:8531b000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531b38c r4:852f3b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a3ec00 r8:852f3bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3b80 r8:8027ed34 r7:eaca5e60 r6:852ffb00 r5:84a3ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaea5fb0 to 0xeaea5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852fd6c0
INFO: task kworker/0:464:4353 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: daf93000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84b4a480
5fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84aac1c0
INFO: task kworker/0:465:4356 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: db195000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:466:4357 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:466   state:D stack:0     pid:4357  tgid:4357  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaeb9d84 r8:00000002 r7:60000113 r6:eaeb9d8c r5:84a40c00
 r4:84a40c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a40c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a40c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead25000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531b78c r4:8531b400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531b78c r4:852f3c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a40c00 r8:852f3cac r7:82804d40 r6:dddced40 r5:dddced60
 r4:852f3c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3c80 r8:8027ed34 r7:eaeb5e60 r6:852ffc00 r5:84a40c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeb9fb0 to 0xeaeb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84aac1c0
INFO: task kworker/0:466:4357 is blocked on a mutex likely owned by task kworker/0:129:3505.
Workqueue: events bpf_prog_free_deferred
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:467:4359 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:467   state:D stack:0     pid:4359  tgid:4359  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaec9d84 r8:00000002 r7:60000113 r6:eaec9d8c r5:84a42400
 r4:84a42400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a42400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aaca80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a42400 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf05000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531cf8c r4:8531cc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84aac100
INFO: task kworker/0:467:4359 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: db48b000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r5:8587db8c r4:8587d800
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:468   state:D stack:0     pid:4360  tgid:4360  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r5:00001000 r4:eaec1000
 r7:dddced40 r6:83018000 r5:8531bf8c r4:852f3d80
 r4:852f3d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:852f3d80 r8:8027ed34 r7:eaec9e60 r6:852ffd00 r5:84a43000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaecdfb0 to 0xeaecdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84aac100
INFO: task kworker/0:468:4360 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: db8fa000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:469:4363 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:469   state:D stack:0     pid:4363  tgid:4363  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:84a41800
 r4:84a41800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a41800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r5:8531c38c r4:8531c000
 r4:852f3e00
Exception stack(0xeaee9fb0 to 0xeaee9ff8)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d60: 800d0113 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:470:4364 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:470   state:D stack:0     pid:4364  tgid:4364  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:84a43c00
 r4:84a43c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a43c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac840
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a43c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaee1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531c78c r4:8531c400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531c78c r4:852f3e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:852f3e80
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: dbc29000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:471:4366 blocked for more than 467 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:84a44800 r4:829185c0
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:852f3f00 r8:8027ed34 r7:eaec9e60 r6:852ffe80 r5:84a44800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: dbc29000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:472:4369 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:472   state:D stack:0     pid:4369  tgid:4369  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08
 r5:8531d78c r4:8531d400
9fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84aac800
INFO: task kworker/0:472:4369 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: dbda8000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
5fa0:                                     00000000 00000000 00000000 00000000
 r5:84a46000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aacc00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a46000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa0b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531d38c r4:8531d000
 r7:dddced40 r6:83018000 r5:8531d38c r4:85368000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
task:kworker/0:474   state:D stack:0     pid:4372  tgid:4372  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:00001000 r4:dfbf9000
 r4:85368080
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8524c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcc7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531e38c r4:8531e000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531e38c r4:85368100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8524c800 r8:8536812c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85368100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85368100 r8:8027ed34 r7:eaa19e60 r6:8536d080 r5:8524c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa61fb0 to 0xeaa61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84aacd40
INFO: task kworker/0:475:4374 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: dc706000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84b48100
Workqueue: events bpf_prog_free_deferred
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Workqueue: events bpf_prog_free_deferred
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:477   state:D stack:0     pid:4378  tgid:4378  ppid:2      task_flags:0x4208060 flags:0x00000000
 r9:83018005 r8:84a49800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8531fb8c r4:8531f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8531fb8c r4:85368200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a49800 r8:8536822c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85368200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85368200 r8:8027ed34 r7:eaa61e60 r6:8536d180 r5:84a49800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf21fb0 to 0xeaf21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85305e80
INFO: task kworker/0:477:4378 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: dcc91000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000001
INFO: task kworker/0:478:4380 blocked for more than 468 seconds.
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:00000000 r9:85368280 r8:8027ed34 r7:eaf21e60 r6:8536d200 r5:84a48c00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85308cc0
INFO: task kworker/0:478:4380 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d60: 800d0113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:61c88647 r9:84a4a400 r8:8536832c r7:82804d40 r6:dddced40 r5:dddced60
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:84b48100
 r4:84a4b000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:85368380
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r5:800d0113 r4:80239bd0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:85368400
 r10:00000000 r9:85368400 r8:8027ed34 r7:eaf21e60 r6:8536d380 r5:84a4bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf41fb0 to 0xeaf41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85375200
INFO: task kworker/0:481:4386 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: dd2ab000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r7:dddced40 r6:83018000 r5:8531f78c r4:85368480
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:483:4391 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:483   state:D stack:0     pid:4391  tgid:4391  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf55d84 r8:00000002 r7:60000113 r6:eaf55d8c r5:84a4d400
 r4:84a4d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a4d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e073d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532038c r4:85320000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84a4d400 r8:8536852c r7:82804d40 r6:dddced40 r5:dddced60
Workqueue: events bpf_prog_free_deferred
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375680
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:85368580 r8:8027ed34 r7:eaf55e60 r6:85368600 r5:84566c00
 r4:853755c0
Call trace: 
5d60: 800d0113 ffffffff
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:829185c4 r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:84562400
 r5:00001000 r4:e0783000
 r10:00000000 r9:85368680 r8:8027ed34 r7:eaf55e60 r6:85368700 r5:84562400
 r4:85375600
INFO: task kworker/0:485:4396 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: de01c000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84870000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:00000000 r9:85368780 r8:8027ed34 r7:eaf51e60 r6:85368800 r5:84870000
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
Workqueue: events bpf_prog_free_deferred
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85320f8c r4:85320c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85320f8c r4:85368880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84870c00 r8:853688ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85368880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85368880 r8:8027ed34 r7:eaf5de60 r6:85368900 r5:84870c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaea9fb0 to 0xeaea9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85375a00
INFO: task kworker/0:487:4398 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: de49a000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
task:kworker/0:488   state:D stack:0     pid:4401  tgid:4401  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r5:8532138c r4:85321000
 r10:00000000 r9:85368980 r8:8027ed34 r7:eaea9e60 r6:85368a00 r5:84871800
Workqueue: events bpf_prog_free_deferred
5d20: de600000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:489:4404 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:489   state:D stack:0     pid:4404  tgid:4404  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:84872400
 r4:84872400
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r5:00001000 r4:ea987000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532178c r4:85321400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532178c r4:85368a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84872400 r8:85368aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85368a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd5fb0 to 0xdffd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b48100
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:490:4405 blocked for more than 468 seconds.
 r4:84873000
 r4:00000000
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84873000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9e1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85321f8c r4:85321c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85321f8c r4:85368b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84873000 r8:85368bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85368b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85368b80 r8:8027ed34 r7:eaf69e60 r6:85368c00 r5:84873000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf6dfb0 to 0xeaf6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:85375d40
 r4:00000000
 r4:dffd5dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r7:dddced40 r6:83018000 r5:85321b8c r4:85368c80
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca19000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8587db8c r4:8587d800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8587db8c r4:84b4a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b4a480
 r10:00000000 r9:84b4a480 r8:8027ed34 r7:dffd9e60 r6:84b4a500 r5:8476d400
      Not tainted 6.16.0-rc3-syzkaller #0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r5:8532278c r4:85322400
Exception stack(0xeaf75fb0 to 0xeaf75ff8)
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
5d20: df1ec000 df9fd000 00000001 80239bb8 7f199000 00000001 82abe1c4 82abd5a0
5d40: 7f199000 df9fd000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0
5d60: 800d0113 ffffffff
 r5:800d0113 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84875400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538c280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa21000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532238c r4:85322000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532238c r4:85368e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84875400 r8:85368eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85368e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85368e80 r8:8027ed34 r7:eaf75e60 r6:85368f00 r5:84875400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf65fb0 to 0xeaf65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8538c180
INFO: task kworker/0:493:4410 is blocked on a mutex likely owned by task kworker/0:129:3505.
task:kworker/0:129   state:R  running task     stack:0     pid:3505  tgid:3505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:8476d400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:8476d400
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffd5d20 to 0xdffd5d68)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:dffd5dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8476d400 r8:84b4a4ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:494   state:D stack:0     pid:4413  tgid:4413  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r5:85322f8c r4:85322c00
Exception stack(0xeaf79fb0 to 0xeaf79ff8)
Workqueue: events bpf_prog_free_deferred
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97a00
 r4:00000001
INFO: task kworker/0:495:4415 blocked for more than 468 seconds.
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538c780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84876c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa99000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85322b8c r4:85322800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85322b8c r4:85393080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84876c00 r8:853930ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393080 r8:8027ed34 r7:eaf79e60 r6:85393100 r5:84876c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf81fb0 to 0xeaf81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8538c800
INFO: task kworker/0:495:4415 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r5:00001000 r4:dfeeb000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:85393180 r8:8027ed34 r7:eaf79e60 r6:85393200 r5:849d8000
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 90000013 ffffffff
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:497:4420 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:497   state:D stack:0     pid:4420  tgid:4420  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:849d8c00
 r4:849d8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538cbc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaed000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532378c r4:85323400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532378c r4:85393280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d8c00 r8:853932ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393280 r8:8027ed34 r7:eaf85e60 r6:85393300 r5:849d8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf89fb0 to 0xeaf89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:df911dc0
 r4:00000000
 r5:84b1eb8c r4:84b1e800
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375f80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead77000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85323f8c r4:85323c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85323f8c r4:85393380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d9800 r8:853933ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393380 r8:8027ed34 r7:eaf89e60 r6:85393400 r5:849d9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf8dfb0 to 0xeaf8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8538c9c0
INFO: task kworker/0:498:4421 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
Exception stack(0xdf911d20 to 0xdf911d68)
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
Exception stack(0xdf911fb0 to 0xdf911ff8)
      Not tainted 6.16.0-rc3-syzkaller #0
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538cfc0
 r7:dddced40 r6:83018000 r5:85323b8c r4:85393480
Exception stack(0xeaf7dfb0 to 0xeaf7dff8)
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:500:4427 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:500   state:D stack:0     pid:4427  tgid:4427  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:849db000
 r4:849db000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849db000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849db000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead9d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532c38c r4:8532c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532c38c r4:85393580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849db000 r8:853935ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393580 r8:8027ed34 r7:eaf8de60 r6:85393600 r5:849db000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:161:4429 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:161   state:D stack:0     pid:4429  tgid:4429  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:84a3d400
 r4:84a3d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a3d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b90c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84a3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae81000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532f38c r4:8532f000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8532f38c r4:8536d500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a3d400 r8:8536d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:8536d500 r8:8027ed34 r7:eae9de60 r6:8536d580 r5:84a3d400
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:df911dc0
 r4:00000000
 r5:00001000 r4:dfeeb000
 r4:833b4e00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ab0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eade9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532cf8c r4:8532cc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532cf8c r4:85393680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab0000 r8:853936ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393680 r8:8027ed34 r7:eaf99e60 r6:8536d600 r5:84ab0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d8180
INFO: task kworker/0:501:4430 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
 r4:82abe1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r4:833b5d80
task:kworker/0:502   state:D stack:0     pid:4431  tgid:4431  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:eadbb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532c78c r4:8532c400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532c78c r4:85393700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab0c00 r8:8539372c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393700 r8:8027ed34 r7:eafa5e60 r6:8536d680 r5:84ab0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa9fb0 to 0xeafa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d8180
INFO: task kworker/0:502:4431 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r5:00001000 r4:dfeeb000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8532cb8c r4:8532c800
 r4:85393780
Exception stack(0xeaf95fb0 to 0xeaf95ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d8240
INFO: task kworker/0:503:4433 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:504:4436 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:504   state:D stack:0     pid:4436  tgid:4436  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8532d78c r4:8532d400
 r10:00000000 r9:85393880 r8:8027ed34 r7:eafa5e60 r6:85393900 r5:849dd400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Exception stack(0xdf911d20 to 0xdf911d68)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdf911fb0 to 0xdf911ff8)
INFO: task kworker/0:505:4437 blocked for more than 468 seconds.
 r10:829185c4 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:849de000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849de000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8740
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadf7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532d38c r4:8532d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532d38c r4:85393980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849de000 r8:853939ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393980 r8:8027ed34 r7:eafade60 r6:85393a00 r5:849de000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb5fb0 to 0xeafb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
1d60: 90000013 ffffffff
 r4:df911dc0
 r5:00001000 r4:dfeeb000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:833b5d80
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8d40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae3f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532e38c r4:8532e000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532e38c r4:85393a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849dec00 r8:85393aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393a80 r8:8027ed34 r7:eafade60 r6:85393b00 r5:849dec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d8780
INFO: task kworker/0:506:4440 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
 r4:df911dc0
 r5:00001000 r4:dfeeb000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:507:4441 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:507   state:D stack:0     pid:4441  tgid:4441  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:849dbc00
 r4:849dbc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849dbc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae1d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:85393b80
1fa0:                                     00000000 00000000 00000000 00000000
1d60: 90000013 ffffffff
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:508:4444 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:508   state:D stack:0     pid:4444  tgid:4444  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:84ab3000
 r4:84ab3000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ab3000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:833b4e00
1fa0:                                     00000000 00000000 00000000 00000000
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:509:4446 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:509   state:D stack:0     pid:4446  tgid:4446  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:84ab1800
 r4:84ab1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ab1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9f40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ab1800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaad000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8533578c r4:85335400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8533578c r4:85393d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab1800 r8:85393d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85393d00 r8:8027ed34 r7:eafb9e60 r6:8536d780 r5:84ab1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd9fb0 to 0xeafd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d8bc0
INFO: task kworker/0:509:4446 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:510:4447 blocked for more than 469 seconds.
 r10:829185c4 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:84ab3c00
 r4:00000000
 r9:83018005 r8:84ab3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
 r10:61c88647 r9:84ab3c00 r8:85393dac r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:511:4449 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:511   state:D stack:0     pid:4449  tgid:4449  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafe5d84 r8:00000002 r7:60000013 r6:eafe5d8c r5:84ab2400
 r4:84ab2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ab2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:85393e00 r8:8027ed34 r7:eafd9e60 r6:8536d880 r5:84ab2400
 r4:848d8d00
Workqueue: events bpf_prog_free_deferred
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:512:4451 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:512   state:D stack:0     pid:4451  tgid:4451  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:84ab4800
 r4:84ab4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ab4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae73000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532ef8c r4:8532ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532ef8c r4:85393e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab4800 r8:85393eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85393e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeafedfb0 to 0xeafedff8)
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:df911dc0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:513:4453 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:513   state:D stack:0     pid:4453  tgid:4453  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8532f78c r4:8532f400
 r4:85393f00
 r10:00000000 r9:85393f00 r8:8027ed34 r7:eafd9e60 r6:85393f80 r5:84848000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafbdfb0 to 0xeafbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b9000
INFO: task kworker/0:513:4453 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:84848c00
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r7:dddced40 r6:83018000 r5:8532fb8c r4:84968000
 r10:00000000 r9:84968000 r8:8027ed34 r7:eafd9e60 r6:84968080 r5:84848c00
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:515:4459 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:515   state:D stack:0     pid:4459  tgid:4459  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:84849800
 r4:84849800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84849800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84849800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb005000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8532ff8c r4:8532fc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8532ff8c r4:84968100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84849800 r8:8496812c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968100 r8:8027ed34 r7:eafd9e60 r6:84968180 r5:84849800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaffdfb0 to 0xeaffdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b93c0
INFO: task kworker/0:515:4459 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:516:4460 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:516   state:D stack:0     pid:4460  tgid:4460  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:8484a400
 r4:8484a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8484a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b96c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8484a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb011000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8533438c r4:85334000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8533438c r4:84968200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8484a400 r8:8496822c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968200 r8:8027ed34 r7:eafd9e60 r6:84968280 r5:8484a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b93c0
INFO: task kworker/0:516:4460 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:517:4462 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:517   state:D stack:0     pid:4462  tgid:4462  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:8484b000
 r4:8484b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8484b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9980
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8484b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb01d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8533478c r4:85334400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8533478c r4:84968300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8484b000 r8:8496832c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968300 r8:8027ed34 r7:eafd9e60 r6:84968380 r5:8484b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb021fb0 to 0xeb021ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b9540
INFO: task kworker/0:517:4462 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:848b9800
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:833b5d80
task:kworker/0:519   state:D stack:0     pid:4466  tgid:4466  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9c00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8484c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9c1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85334f8c r4:85334c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85334f8c r4:84968500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8484c800 r8:8496852c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968500 r8:8027ed34 r7:eafd9e60 r6:84968580 r5:8484c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb02dfb0 to 0xeb02dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b9b40
INFO: task kworker/0:519:4466 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:df911dc0
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:8484e000
 r4:8484e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8484e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8484e000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00a7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85336b8c r4:85336800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85336b8c r4:84968700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8484e000 r8:8496872c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968700 r8:8027ed34 r7:eafd9e60 r6:84968780 r5:8484e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed1fb0 to 0xeaed1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b9d40
INFO: task kworker/0:521:4471 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:522:4472 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:522   state:D stack:0     pid:4472  tgid:4472  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaee5d84 r8:00000002 r7:60000013 r6:eaee5d8c r5:8484ec00
 r4:8484ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8484ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d8f80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8484ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb53000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85335b8c r4:85335800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85335b8c r4:84968800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8484ec00 r8:8496882c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968800 r8:8027ed34 r7:eaed1e60 r6:84968880 r5:8484ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee5fb0 to 0xeaee5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b9f00
INFO: task kworker/0:522:4472 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
 r10:829185c4 r9:eaed9d84 r8:00000002 r7:60000113 r6:eaed9d8c r5:849d0000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:849d0000 r8:8496892c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968900 r8:8027ed34 r7:eaed1e60 r6:84968980 r5:849d0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed9fb0 to 0xeaed9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848b9f00
INFO: task kworker/0:523:4474 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:524:4477 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:524   state:D stack:0     pid:4477  tgid:4477  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:849d0c00
 r4:849d0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff49000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8533638c r4:85336000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8533638c r4:84968a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d0c00 r8:84968a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a93080
INFO: task kworker/0:524:4477 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdf911fb0 to 0xdf911ff8)
INFO: task kworker/0:525:4479 blocked for more than 469 seconds.
 r5:849d1800 r4:829185c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a93340
INFO: task kworker/0:525:4479 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:526:4481 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:526   state:D stack:0     pid:4481  tgid:4481  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:849d2400
 r4:849d2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03f2000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85336f8c r4:85336c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85336f8c r4:84968c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d2400 r8:84968c2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968c00 r8:8027ed34 r7:eaed1e60 r6:84968c80 r5:849d2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb03dfb0 to 0xeb03dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a93380
INFO: task kworker/0:526:4481 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f5a1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:527:4483 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:527   state:D stack:0     pid:4483  tgid:4483  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb041d84 r8:00000002 r7:60000013 r6:eb041d8c r5:849d3000
 r4:849d3000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d3000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93880
 r5:00001000 r4:e04e1000
 r5:8533738c r4:85337000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
1d60: 90000013 ffffffff
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:833b4e00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:528:4485 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:528   state:D stack:0     pid:4485  tgid:4485  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:849d4800
 r4:849d4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a939c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e054d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8533778c r4:85337400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8533778c r4:84968e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d4800 r8:84968e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968e00 r8:8027ed34 r7:eb041e60 r6:84968e80 r5:849d4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf09fb0 to 0xeaf09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a93680
INFO: task kworker/0:528:4485 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:529:4486 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
 r4:84ab6000
 r5:84ab6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93e80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e4859000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85337f8c r4:85337c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85337f8c r4:84968f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab6000 r8:84968f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968f00 r8:8027ed34 r7:eaf09e60 r6:8536d980 r5:84ab6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb04dfb0 to 0xeb04dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a93840
INFO: task kworker/0:529:4486 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:162:4490 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:162   state:D stack:0     pid:4490  tgid:4490  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:84ab6c00
 r4:84ab6c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ab6c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa4340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84ab6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07ea000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85337b8c r4:85337800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85337b8c r4:8536da00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab6c00 r8:8536da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8536da00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536da00 r8:8027ed34 r7:eae9de60 r6:8536da80 r5:84ab6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb045fb0 to 0xeb045ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84aa4300
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdf911d20 to 0xdf911d68)
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:163:4491 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:163   state:D stack:0     pid:4491  tgid:4491  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:84ab5400
 r4:84ab5400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ab5400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa4d00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabd1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852c838c r4:852c8000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852c838c r4:8536db00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab5400 r8:8536db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8536db00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8536db00 r8:8027ed34 r7:eae9de60 r6:8536db80 r5:84ab5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:530:4493 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:530   state:D stack:0     pid:4493  tgid:4493  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:84a4e000
 r4:84a4e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a4e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93b00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea959000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534078c r4:85340400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534078c r4:84968f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a4e000 r8:84968fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84968f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84968f80 r8:8027ed34 r7:eb04de60 r6:8536dc00 r5:84a4e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb055fb0 to 0xeb055ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a93d00
INFO: task kworker/0:530:4493 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 90000013 ffffffff
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84ac0000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93fc0
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a93e40
INFO: task kworker/0:531:4495 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r5:84ac1800 r4:829185c0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ef80
dfa0:                                     00000000 00000000 00000000 00000000
1d60: 90000013 ffffffff
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84aa1100 r8:8027ed34 r7:eb06de60 r6:8536dd80 r5:84ac0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb075fb0 to 0xeb075ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8536ea40
INFO: task kworker/0:533:4499 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r5:00001000 r4:dfeeb000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
INFO: task kworker/0:534:4500 blocked for more than 469 seconds.
 r5:849d3c00 r4:829185c0
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:84aa1180
INFO: task kworker/0:534:4500 is blocked on a mutex likely owned by task kworker/1:1:43.
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:61c88647 r9:84ac2400 r8:8536de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:165   state:D stack:0     pid:4505  tgid:4505  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa40c0
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:535:4507 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:535   state:D stack:0     pid:4507  tgid:4507  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb081d84 r8:00000002 r7:60000013 r6:eb081d8c r5:84ac5400
 r4:84ac5400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ac5400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a312c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ac5400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac59000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534178c r4:85341400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534178c r4:84aa1280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ac5400 r8:84aa12ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84a31000
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:536:4509 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:536   state:D stack:0     pid:4509  tgid:4509  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb089d84 r8:00000002 r7:60000113 r6:eb089d8c r5:84ac4800
 r4:84ac4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ac4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ac4800 r8:84aa132c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1300 r8:8027ed34 r7:eb081e60 r6:84a37080 r5:84ac4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fa0:                                     00000000 00000000 00000000 00000000
1d60: 90000013 ffffffff
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaccd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534278c r4:85342400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534278c r4:84aa1380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ac6c00 r8:84aa13ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1380 r8:8027ed34 r7:eb089e60 r6:84a37100 r5:84ac6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb08dfb0 to 0xeb08dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a31140
INFO: task kworker/0:537:4511 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
1d60: 90000013 ffffffff
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:166   state:D stack:0     pid:4513  tgid:4513  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:84ac6000
 r4:84ac6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84ac6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84ac6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae35000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852c8f8c r4:852c8c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852c8f8c r4:84a37180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ac6000 r8:84a371ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a37180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a37180 r8:8027ed34 r7:eae9de60 r6:84a37200 r5:84ac6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb059fb0 to 0xeb059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84aa4600
INFO: task kworker/1:166:4513 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:538   state:D stack:0     pid:4514  tgid:4514  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a316c0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacb7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534238c r4:85342000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534238c r4:84aa1400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ac3000 r8:84aa142c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1400 r8:8027ed34 r7:eb08de60 r6:84a37280 r5:84ac3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb091fb0 to 0xeb091ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a31600
INFO: task kworker/0:538:4514 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:539:4517 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:539   state:D stack:0     pid:4517  tgid:4517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb095d84 r8:00000002 r7:60000013 r6:eb095d8c r5:84a4ec00
 r4:84a4ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a4ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31940
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb93000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85342b8c r4:85342800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85342b8c r4:84aa1480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a4ec00 r8:84aa14ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1480 r8:8027ed34 r7:eb08de60 r6:84a37300 r5:84a4ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb095fb0 to 0xeb095ff8)
5fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:539:4517 is blocked on a mutex likely owned by task kworker/1:1:43.
1d60: 90000013 ffffffff
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:540:4519 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:540   state:D stack:0     pid:4519  tgid:4519  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:85348000
 r4:85348000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85348000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31bc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85348000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcb1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534338c r4:85343000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534338c r4:84aa1500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85348000 r8:84aa152c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1500 r8:8027ed34 r7:eb095e60 r6:84a37380 r5:85348000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf1fb0 to 0xeaaf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:541:4521 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:541   state:D stack:0     pid:4521  tgid:4521  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaafdd84 r8:00000002 r7:60000013 r6:eaafdd8c r5:85348c00
 r4:85348c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85348c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31a80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85348c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc27000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85342f8c r4:85342c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85342f8c r4:84aa1580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85348c00 r8:84aa15ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1580 r8:8027ed34 r7:eaaf1e60 r6:84a37400 r5:85348c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaafdfb0 to 0xeaafdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:542:4524 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:542   state:D stack:0     pid:4524  tgid:4524  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:8534b000
 r4:8534b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8534b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31cc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8534b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534378c r4:85343400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534378c r4:84aa1600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:84aa1600 r8:8027ed34 r7:eaaf1e60 r6:84a37480 r5:8534b000
 r4:84a31a40
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:543:4525 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:543   state:D stack:0     pid:4525  tgid:4525  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb085d84 r8:00000002 r7:60000013 r6:eb085d8c r5:849d6000
 r4:849d6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
 r5:85343f8c r4:85343c00
 r4:84aa1680
5fa0:                                     00000000 00000000 00000000 00000000
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:544:4526 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:544   state:D stack:0     pid:4526  tgid:4526  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb07dd84 r8:00000002 r7:60000013 r6:eb07dd8c r5:849d5400
 r4:849d5400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d5400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a31e00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffcb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85343b8c r4:85343800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85343b8c r4:84aa1780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d5400 r8:84aa17ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1780 r8:8027ed34 r7:eb085e60 r6:84aa1800 r5:849d5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb07dfb0 to 0xeb07dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:545:4529 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:545   state:D stack:0     pid:4529  tgid:4529  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf0dd84 r8:00000002 r7:60000013 r6:eaf0dd8c r5:84a28000
 r4:84a28000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a28000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d06c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a28000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0661000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534438c r4:85344000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534438c r4:84aa1880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a28000 r8:84aa18ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1880 r8:8027ed34 r7:eb085e60 r6:84aa1900 r5:84a28000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf0dfb0 to 0xeaf0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:848d03c0
INFO: task kworker/0:545:4529 is blocked on a mutex likely owned by task kworker/1:1:43.
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:546:4530 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:546   state:D stack:0     pid:4530  tgid:4530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:84a28c00
 r4:84a28c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a28c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06d1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534478c r4:85344400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534478c r4:84aa1980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a28c00 r8:84aa19ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1980 r8:8027ed34 r7:eaf0de60 r6:84aa1a00 r5:84a28c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb009fb0 to 0xeb009ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a31f00
INFO: task kworker/0:546:4530 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:547:4532 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:547   state:D stack:0     pid:4532  tgid:4532  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb031d84 r8:00000002 r7:60000013 r6:eb031d8c r5:84a2a400
 r4:84a2a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a2a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d7c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e88fd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:dddced40 r6:83018000 r5:8534538c r4:84aa1a80
 r4:84aa1a80
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:548:4533 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:548   state:D stack:0     pid:4533  tgid:4533  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:84a2b000
 r4:84a2b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a2b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d5c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0797000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85344b8c r4:85344800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85344b8c r4:84aa1b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a2b000 r8:84aa1bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1b80 r8:8027ed34 r7:eb031e60 r6:84aa1c00 r5:84a2b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb099fb0 to 0xeb099ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8539d080
INFO: task kworker/0:548:4533 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:549:4538 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:549   state:D stack:0     pid:4538  tgid:4538  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:8534c800
 r4:8534c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8534c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d6c0
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 90000013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:550:4540 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:550   state:D stack:0     pid:4540  tgid:4540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0add84 r8:00000002 r7:60000113 r6:eb0add8c r5:85349800
 r4:85349800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85349800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539dac0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85349800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9d7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85345b8c r4:85345800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85345b8c r4:84aa1d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85349800 r8:84aa1d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1d00 r8:8027ed34 r7:eb031e60 r6:84a37580 r5:85349800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0adfb0 to 0xeb0adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8539d800
INFO: task kworker/0:550:4540 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:ea989000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534578c r4:85345400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534578c r4:84aa1d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a29800 r8:84aa1dac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1d80 r8:8027ed34 r7:eb0ade60 r6:84aa1e00 r5:84a29800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb09dfb0 to 0xeb09dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8539d800
INFO: task kworker/0:551:4541 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:eb0b1d84 r8:00000002 r7:60000113 r6:eb0b1d8c r5:84a2c800
 r4:84a2c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a2c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539dc00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa15000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85345f8c r4:85345c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85345f8c r4:84aa1e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a2c800 r8:84aa1eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1e80 r8:8027ed34 r7:eb0ade60 r6:84aa1f00 r5:84a2c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b1fb0 to 0xeb0b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8539d780
INFO: task kworker/0:552:4544 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 90000013 ffffffff
 r5:90000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:553:4547 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:84a2d400
 r4:84a2d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a2d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539dd40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa77000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534638c r4:85346000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534638c r4:84aa1f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a2d400 r8:84aa1fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84aa1f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:553:4547 is blocked on a mutex likely owned by task kworker/1:1:43.
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:554:4548 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:554   state:D stack:0     pid:4548  tgid:4548  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:84a2e000
 r4:84a2e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a2e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539df00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaa1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534678c r4:85346400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534678c r4:853a8080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a2e000 r8:853a80ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8080 r8:8027ed34 r7:eb0b5e60 r6:853a8100 r5:84a2e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe1fb0 to 0xeafe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8539da80
INFO: task kworker/0:554:4548 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d20: 7f915000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:555   state:D stack:0     pid:4551  tgid:4551  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:84a2ec00
 r4:84a2ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a2ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d0c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaabd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85346b8c r4:85346800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85346b8c r4:853a8180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a2ec00 r8:853a81ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8180 r8:8027ed34 r7:eafe1e60 r6:853a8200 r5:84a2ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b9fb0 to 0xeb0b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r4:833b5d80
task:kworker/0:556   state:D stack:0     pid:4552  tgid:4552  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0c1d84 r8:00000002 r7:60000013 r6:eb0c1d8c r5:84a2bc00
 r4:84a2bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a2bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaf9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85346f8c r4:85346c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85346f8c r4:853a8280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a2bc00 r8:853a82ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8280 r8:8027ed34 r7:eb0b9e60 r6:853a8300 r5:84a2bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0c1fb0 to 0xeb0c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9080
INFO: task kworker/0:556:4552 is blocked on a mutex likely owned by task kworker/1:1:43.
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:82abe1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:557:4554 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:557   state:D stack:0     pid:4554  tgid:4554  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:849d6c00
 r4:849d6c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d6c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a94c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacf3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:849d6c00 r8:853a83ac r7:82804d40 r6:dddced40 r5:dddced60
Workqueue: events bpf_prog_free_deferred
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:558   state:D stack:0     pid:4556  tgid:4556  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0cdd84 r8:00000002 r7:60000013 r6:eb0cdd8c r5:849f0000
 r4:849f0000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f0000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab41000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8534738c r4:85347000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8534738c r4:853a8480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f0000 r8:853a84ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8480 r8:8027ed34 r7:eb0c9e60 r6:853a8500 r5:849f0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0cdfb0 to 0xeb0cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9180
INFO: task kworker/0:558:4556 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:559   state:D stack:0     pid:4558  tgid:4558  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9700
 r5:00001000 r4:ead07000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85347b8c r4:85347800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85347b8c r4:853a8580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f0c00 r8:853a85ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8580 r8:8027ed34 r7:eb0c9e60 r6:853a8600 r5:849f0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0bdfb0 to 0xeb0bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9180
INFO: task kworker/0:559:4558 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:560:4560 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:560   state:D stack:0     pid:4560  tgid:4560  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0d1d84 r8:00000002 r7:60000113 r6:eb0d1d8c r5:849f1800
 r4:849f1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead8b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544878c r4:85448400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544878c r4:853a8680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f1800 r8:853a86ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8680 r8:8027ed34 r7:eb0bde60 r6:853a8700 r5:849f1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0d1fb0 to 0xeb0d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9580
INFO: task kworker/0:560:4560 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:561:4562 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:561   state:D stack:0     pid:4562  tgid:4562  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:849f2400
 r4:849f2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a97c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead23000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85347f8c r4:85347c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85347f8c r4:853a8780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f2400 r8:853a87ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8780 r8:8027ed34 r7:eb0d1e60 r6:853a8800 r5:849f2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0d9fb0 to 0xeb0d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a95c0
INFO: task kworker/0:561:4562 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:562:4563 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:562   state:D stack:0     pid:4563  tgid:4563  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r5:849f3000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018005 r8:849f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:849f3000 r8:853a88ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8880 r8:8027ed34 r7:eb0d1e60 r6:853a8900 r5:849f3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0ddfb0 to 0xeb0ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a95c0
INFO: task kworker/0:562:4563 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:563:4566 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:563   state:D stack:0     pid:4566  tgid:4566  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:849f3c00
 r4:849f3c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f3c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9bc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85448b8c r4:85448800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85448b8c r4:853a8980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f3c00 r8:853a89ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8980 r8:8027ed34 r7:eb0d1e60 r6:853a8a00 r5:849f3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e1fb0 to 0xeb0e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9bc0
INFO: task kworker/0:563:4566 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:564:4568 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:564   state:D stack:0     pid:4568  tgid:4568  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:849f4800
 r4:849f4800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f4800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9d40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaddd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85448f8c r4:85448c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85448f8c r4:853a8a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f4800 r8:853a8aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8a80 r8:8027ed34 r7:eb0e1e60 r6:853a8b00 r5:849f4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e5fb0 to 0xeb0e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9d40
INFO: task kworker/0:564:4568 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:565:4570 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:565   state:D stack:0     pid:4570  tgid:4570  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0e9d84 r8:00000002 r7:60000013 r6:eb0e9d8c r5:849f5400
 r4:849f5400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f5400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae1f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85449b8c r4:85449800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85449b8c r4:853a8b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f5400 r8:853a8bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8b80 r8:8027ed34 r7:eb0e5e60 r6:853a8c00 r5:849f5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e9fb0 to 0xeb0e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9b00
INFO: task kworker/0:565:4570 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:df911dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:566:4571 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:566   state:D stack:0     pid:4571  tgid:4571  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:849f6000
 r4:849f6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d07c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae03000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544978c r4:85449400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544978c r4:853a8c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f6000 r8:853a8cac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8c80 r8:8027ed34 r7:eb0e9e60 r6:853a8d00 r5:849f6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0d5fb0 to 0xeb0d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853a9b00
INFO: task kworker/0:566:4571 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:567:4575 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:567   state:D stack:0     pid:4575  tgid:4575  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:8534a400
 r4:8534a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8534a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8534a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae77000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544a38c r4:8544a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544a38c r4:853a8d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8534a400 r8:853a8dac r7:82804d40 r6:dddced40 r5:dddced60
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:167:4576 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:167   state:D stack:0     pid:4576  tgid:4576  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:8534e000
 r4:8534e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8534e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r4:00000000
1d60: 80000013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:568:4578 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:568   state:D stack:0     pid:4578  tgid:4578  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:85420000
 r4:85420000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85420000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85420000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae67000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85449f8c r4:85449c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85449f8c r4:853a8e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85420000 r8:853a8e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:853a8e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853a8e00 r8:8027ed34 r7:eb0f9e60 r6:853a8e80 r5:85420000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0f1fb0 to 0xeb0f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853c0140
INFO: task kworker/0:568:4578 is blocked on a mutex likely owned by task kworker/1:1:43.
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:168:4579 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:168   state:D stack:0     pid:4579  tgid:4579  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:85421800
 r4:85421800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85421800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc800
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae93000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852c978c r4:852c9400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852c978c r4:84a37780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85421800 r8:84a377ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a37780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a37780 r8:8027ed34 r7:eb0f5e60 r6:853a8f00 r5:85421800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb101fb0 to 0xeb101ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853bc3c0
INFO: task kworker/1:168:4579 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
1d60: 80000013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:00000000
 r5:00001000 r4:dfeeb000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:169:4582 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:169   state:D stack:0     pid:4582  tgid:4582  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:85422400
 r4:85422400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85422400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b500
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85422400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb201000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852caf8c r4:852cac00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852caf8c r4:84a37800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85422400 r8:84a3782c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a37800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a37800 r8:8027ed34 r7:eb101e60 r6:853a8f80 r5:85422400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0fdfb0 to 0xeb0fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853bc500
INFO: task kworker/1:169:4582 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
1d20: 81d61000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:569:4583 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:569   state:D stack:0     pid:4583  tgid:4583  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:85423000
 r4:85423000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85423000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0a80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85423000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaed3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544ab8c r4:8544a800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544ab8c r4:853b6000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85423000 r8:853b602c r7:82804d40 r6:dddced40 r5:dddced60
 r4:853b6000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853b6000 r8:8027ed34 r7:eb0f9e60 r6:853b6080 r5:85423000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb105fb0 to 0xeb105ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853c0580
INFO: task kworker/0:569:4583 is blocked on a mutex likely owned by task kworker/1:1:43.
 r4:00000000
1d60: 80000013 ffffffff
 r4:df911dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:570:4585 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:570   state:D stack:0     pid:4585  tgid:4585  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:85423c00
 r4:85423c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85423c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0900
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85423c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeb1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544a78c r4:8544a400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544a78c r4:853b6100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85423c00 r8:853b612c r7:82804d40 r6:dddced40 r5:dddced60
 r4:853b6100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853b6100 r8:8027ed34 r7:eb105e60 r6:853b6180 r5:85423c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0edfb0 to 0xeb0edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853c0440
INFO: task kworker/0:570:4585 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 84417000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:170:4587 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:170   state:D stack:0     pid:4587  tgid:4587  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:85424800
 r4:85424800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85424800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852c9b8c r4:852c9800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852c9b8c r4:84a37880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85424800 r8:84a378ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a37880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a37880 r8:8027ed34 r7:eb0fde60 r6:853b6280 r5:85424800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb10dfb0 to 0xeb10dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853bc5c0
INFO: task kworker/1:170:4587 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 848bc000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:571:4589 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:571   state:D stack:0     pid:4589  tgid:4589  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:8534ec00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0c80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8534ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:853c07c0
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:833b4e00
 r4:833b5d80
 r4:8534bc00
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e485b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852ca78c r4:852ca400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852ca78c r4:84a37980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8534bc00 r8:84a379ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a37980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a37980 r8:8027ed34 r7:eb0fde60 r6:84a37a00 r5:8534bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb109fb0 to 0xeb109ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853bc940
INFO: task kworker/1:171:4592 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 84ce9000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdf911fb0 to 0xdf911ff8)
INFO: task kworker/0:572:4594 blocked for more than 471 seconds.
 r5:84ab8000 r4:829185c0
 r4:00000000
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544b38c r4:8544b000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544b38c r4:853b6300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab8000 r8:853b632c r7:82804d40 r6:dddced40 r5:dddced60
 r4:853b6300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853b6300 r8:8027ed34 r7:eb131e60 r6:84a37a80 r5:84ab8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb139fb0 to 0xeb139ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853c0cc0
INFO: task kworker/0:572:4594 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
 r4:82abe1e4
 r4:df911dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84ab9800 r4:829185c0
 r4:00000000
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8544bf8c r4:8544bc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544bf8c r4:853b6380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84ab9800 r8:853b63ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:853b6380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:853b6380 r8:8027ed34 r7:eb139e60 r6:84a37b00 r5:84ab9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb141fb0 to 0xeb141ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853c0b80
INFO: task kworker/0:573:4596 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 859ca000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:853b6400
5fa0:                                     00000000 00000000 00000000 00000000
 r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:575:4599 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:575   state:D stack:0     pid:4599  tgid:4599  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb149d84 r8:00000002 r7:60000113 r6:eb149d8c r5:84abb000
 r4:84abb000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84abb000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0240
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84abb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf3b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8544bb8c r4:8544b800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8544bb8c r4:853b6480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84abb000 r8:853b64ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:853b6480 r8:8027ed34 r7:eb141e60 r6:84a37c00 r5:84abb000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8603f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84abc800 r8:853b652c r7:82804d40 r6:dddced40 r5:dddced60
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
1d60: 80000013 ffffffff
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:577:4603 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:577   state:D stack:0     pid:4603  tgid:4603  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:84abd400
 r4:84abd400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84abd400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8545438c r4:85454000
 r4:853b6580
5fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
1d20: 86929000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:578:4605 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:578   state:D stack:0     pid:4605  tgid:4605  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:84abbc00
 r4:84abbc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84abbc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c42c0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84abbc00 r8:853b662c r7:82804d40 r6:dddced40 r5:dddced60
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
1d20: 869b8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:579:4607 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:579   state:D stack:0     pid:4607  tgid:4607  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb129d84 r8:00000002 r7:60000113 r6:eb129d8c r5:85425400
 r4:85425400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85425400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:853b6680
9fa0:                                     00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:580:4610 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:580   state:D stack:0     pid:4610  tgid:4610  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:85426c00
 r4:85426c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85426c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4880
 r5:8545578c r4:85455400
 r4:853b6780
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:581:4612 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:581   state:D stack:0     pid:4612  tgid:4612  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb169d84 r8:00000002 r7:60000013 r6:eb169d8c r5:85426000
 r5:85426000 r4:829185c0
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4700
 r5:8545538c r4:85455000
 r10:61c88647 r9:85426000 r8:853b68ac r7:82804d40 r6:dddced40 r5:dddced60
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/0:582   state:D stack:0     pid:4614  tgid:4614  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85420c00 r8:853b69ac r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 87cd4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:583   state:D stack:0     pid:4616  tgid:4616  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:85455b8c r4:85455800
 r4:853b6a80
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:584:4619 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:584   state:D stack:0     pid:4619  tgid:4619  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r5:85428000 r4:829185c0
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:853b6b80 r8:8027ed34 r7:eb16de60 r6:853b6c00 r5:85428000
INFO: task kworker/0:584:4619 is blocked on a mutex likely owned by task kworker/1:1:43.
1d20: 87f2a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:585:4620 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:585   state:D stack:0     pid:4620  tgid:4620  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r5:85428c00 r4:829185c0
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:853b6c80 r8:8027ed34 r7:eb175e60 r6:853b6d00 r5:85428c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8819b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:586:4622 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:586   state:D stack:0     pid:4622  tgid:4622  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:85429800
 r4:85429800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85429800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c4fc0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85429800 r8:853b6dac r7:82804d40 r6:dddced40 r5:dddced60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:853c4c40
INFO: task kworker/0:586:4622 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8833d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:587:4624 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:587   state:D stack:0     pid:4624  tgid:4624  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:8542a400
 r4:8542a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8542a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:853b6e80 r8:8027ed34 r7:eb181e60 r6:853b6f00 r5:8542a400
 r4:853bcf40
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 88596000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdf911fb0 to 0xdf911ff8)
INFO: task kworker/0:588:4625 blocked for more than 471 seconds.
 r5:8542b000 r4:829185c0
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc000
 r5:85456f8c r4:85456c00
 r10:61c88647 r9:8542b000 r8:853b6fac r7:82804d40 r6:dddced40 r5:dddced60
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:853bcf40
INFO: task kworker/0:588:4625 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 88903000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:589:4628 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8542bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0069000
 r5:8545778c r4:85457400
 r10:61c88647 r9:8542bc00 r8:849200ac r7:82804d40 r6:dddced40 r5:dddced60
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:df911dc0
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:590:4630 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:590   state:D stack:0     pid:4630  tgid:4630  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8542d400
 r4:8542d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8542d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849034c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8542d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00eb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85457b8c r4:85457800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85457b8c r4:84920180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8542d400 r8:849201ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920180 r8:8027ed34 r7:eb18de60 r6:84920200 r5:8542d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb191fb0 to 0xeb191ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84903100
INFO: task kworker/0:590:4630 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 88d0c000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
INFO: task kworker/0:591:4632 blocked for more than 471 seconds.
task:kworker/0:591   state:D stack:0     pid:4632  tgid:4632  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:8542ec00
 r4:8542ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8542ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849037c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8542ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:8542ec00 r8:849202ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Exception stack(0xdf911d20 to 0xdf911d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:592   state:D stack:0     pid:4634  tgid:4634  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb19dd84 r8:00000002 r7:60000013 r6:eb19dd8c r5:84a08000
 r4:84a08000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a08000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5fb40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a08000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07e8000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852ca38c r4:852ca000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:852ca38c r4:84920380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a08000 r8:849203ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920380 r8:8027ed34 r7:eb195e60 r6:84920400 r5:84a08000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb19dfb0 to 0xeb19dff8)
dfa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:592:4634 is blocked on a mutex likely owned by task kworker/1:1:43.
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:df911dc0
 r5:00001000 r4:dfeeb000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:593   state:D stack:0     pid:4637  tgid:4637  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:84a09800
 r4:84a09800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a09800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903d80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a09800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaf5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546478c r4:85464400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546478c r4:84920480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a09800 r8:849204ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920480 r8:8027ed34 r7:eb19de60 r6:84920500 r5:84a09800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a1fb0 to 0xeb1a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84903840
Call trace: 
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:dfeeb000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84a0b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b400
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:84a0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1f5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852cab8c r4:852ca800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852cab8c r4:84a37e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a0b000 r8:84a37e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a37e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a37e00 r8:8027ed34 r7:eb0fde60 r6:84a37e80 r5:84a0b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a9fb0 to 0xeb1a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5fb00
INFO: task kworker/1:172:4639 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 898ec000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:594:4640 blocked for more than 472 seconds.
Workqueue: events bpf_prog_free_deferred
 r4:84ab8c00
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8546438c r4:85464000
 r7:dddced40 r6:83018000 r5:8546438c r4:84920580
 r10:61c88647 r9:84ab8c00 r8:849205ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920580 r8:8027ed34 r7:eb1a1e60 r6:84a37f00 r5:84ab8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb135fb0 to 0xeb135ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84903580
INFO: task kworker/0:594:4640 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 89c07000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:595:4643 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:595   state:D stack:0     pid:4643  tgid:4643  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb199d84 r8:00000002 r7:60000013 r6:eb199d8c r5:84abe000
 r4:84abe000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84abe000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84abe000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabad000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85464b8c r4:85464800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85464b8c r4:84920600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84abe000 r8:8492062c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
1d60: 80000013 ffffffff
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:596   state:D stack:0     pid:4645  tgid:4645  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac25000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546538c r4:85465000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546538c r4:84920680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84abec00 r8:849206ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920680 r8:8027ed34 r7:eb199e60 r6:848ba000 r5:84abec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1adfb0 to 0xeb1adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84903d40
INFO: task kworker/0:596:4645 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8a150000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:597:4647 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:597   state:D stack:0     pid:4647  tgid:4647  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:85350000
 r4:85350000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85350000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84903640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85350000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabdd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85464f8c r4:85464c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85464f8c r4:84920700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85350000 r8:8492072c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920700 r8:8027ed34 r7:eb1ade60 r6:848ba080 r5:85350000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b5fb0 to 0xeb1b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84903e80
INFO: task kworker/0:597:4647 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8a450000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:598:4649 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:598   state:D stack:0     pid:4649  tgid:4649  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:85351800
 r4:85351800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85351800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85351800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac5f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546578c r4:85465400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546578c r4:84920780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85351800 r8:849207ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920780 r8:8027ed34 r7:eb1ade60 r6:848ba100 r5:85351800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1bdfb0 to 0xeb1bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84903f00
INFO: task kworker/0:598:4649 is blocked on a mutex likely owned by task kworker/1:1:43.
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8a450000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:599:4651 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:599   state:D stack:0     pid:4651  tgid:4651  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1c5d84 r8:00000002 r7:60000013 r6:eb1c5d8c r5:85350c00
 r4:85350c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85350c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85350c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacad000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85465f8c r4:85465c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85465f8c r4:84920800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85350c00 r8:8492082c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920800 r8:8027ed34 r7:eb1bde60 r6:848ba180 r5:85350c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c5fb0 to 0xeb1c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b45000
INFO: task kworker/0:599:4651 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8a83c000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:600:4652 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:600   state:D stack:0     pid:4652  tgid:4652  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:85353000
 r4:85353000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85353000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45000
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85353000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac79000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85465b8c r4:85465800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85465b8c r4:84920880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85353000 r8:849208ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920880 r8:8027ed34 r7:eb1c5e60 r6:848ba200 r5:85353000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c9fb0 to 0xeb1c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b45240
INFO: task kworker/0:600:4652 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8aa6f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:601:4654 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:601   state:D stack:0     pid:4654  tgid:4654  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1d1d84 r8:00000002 r7:60000113 r6:eb1d1d8c r5:85352400
 r4:85352400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85352400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45c40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85352400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb21d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546738c r4:85467000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546738c r4:84920900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85352400 r8:8492092c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920900 r8:8027ed34 r7:eb1c5e60 r6:848ba280 r5:85352400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d1fb0 to 0xeb1d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b45240
INFO: task kworker/0:601:4654 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8aa6f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b455c0
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546638c r4:84920980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85355400 r8:849209ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920980 r8:8027ed34 r7:eb1d1e60 r6:848ba300 r5:85355400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d9fb0 to 0xeb1d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b45280
INFO: task kworker/0:602:4656 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8af8b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:833b4e00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:603   state:D stack:0     pid:4659  tgid:4659  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:85356c00 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8546678c r4:85466400
 r10:61c88647 r9:85356c00 r8:84920a2c r7:82804d40 r6:dddced40 r5:dddced60
dfa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8af8b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:604:4660 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:604   state:D stack:0     pid:4660  tgid:4660  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:85354800
 r4:85354800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85354800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45840
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85354800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1e5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85466b8c r4:85466800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85466b8c r4:84920a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/0:604:4660 is blocked on a mutex likely owned by task kworker/1:1:43.
 r4:00000000
 r4:82abe1e4
 r4:df911dc0
 r5:00001000 r4:dfeeb000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:173:4663 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:173   state:D stack:0     pid:4663  tgid:4663  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1a5d84 r8:00000002 r7:60000113 r6:eb1a5d8c r5:85353c00
 r4:85353c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85353c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b680
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85353c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb209000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852cb38c r4:852cb000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852cb38c r4:848ba480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85353c00 r8:848ba4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:848ba480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848ba480 r8:8027ed34 r7:eb0fde60 r6:848ba500 r5:85353c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a5fb0 to 0xeb1a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7b300
INFO: task kworker/1:173:4663 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8b388000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
 r4:833b4e00
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:174:4666 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:174   state:D stack:0     pid:4666  tgid:4666  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1b1d84 r8:00000002 r7:60000113 r6:eb1b1d8c r5:85356000
 r4:85356000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85356000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:848ba580 r8:8027ed34 r7:eb1a5e60 r6:848ba600 r5:85356000
INFO: task kworker/1:174:4666 is blocked on a mutex likely owned by task kworker/1:1:43.
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r5:84b1eb8c r4:84b1e800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:175   state:D stack:0     pid:4667  tgid:4667  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:8534d400
 r4:8534d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8534d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8534d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2c1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:852cb78c r4:852cb400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:852cb78c r4:848ba680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8534d400 r8:848ba6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:848ba680
Exception stack(0xeb1e9fb0 to 0xeb1e9ff8)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdf911d20 to 0xdf911d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:605:4669 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:605   state:D stack:0     pid:4669  tgid:4669  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb221d84 r8:00000002 r7:60000013 r6:eb221d8c r5:85358000
 r4:85358000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85358000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85358000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb211000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85466f8c r4:85466c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85466f8c r4:84920b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85358000 r8:84920b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920b00 r8:8027ed34 r7:eb1d1e60 r6:848ba780 r5:85358000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb221fb0 to 0xeb221ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b459c0
INFO: task kworker/0:605:4669 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
Exception stack(0xdf911d20 to 0xdf911d68)
 r5:80000013 r4:80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:606:4671 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:606   state:D stack:0     pid:4671  tgid:4671  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:85359800
 r4:85359800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85359800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45d40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85359800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb229000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546778c r4:85467400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546778c r4:84920b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85359800 r8:84920bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920b80 r8:8027ed34 r7:eb1d1e60 r6:848ba800 r5:85359800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb231fb0 to 0xeb231ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b45a40
INFO: task kworker/0:606:4671 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8be11000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r5:80000013 r4:80239bd0
 r4:df911dc0
 r4:00000000
 r5:00001000 r4:dfeeb000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:607:4673 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:607   state:D stack:0     pid:4673  tgid:4673  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb241d84 r8:00000002 r7:60000113 r6:eb241d8c r5:85358c00
 r4:85358c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85358c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85358c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb239000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85467b8c r4:85467800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85467b8c r4:84920c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85358c00 r8:84920c2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920c00 r8:8027ed34 r7:eb231e60 r6:848ba880 r5:85358c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb241fb0 to 0xeb241ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
1d60: 80000013 ffffffff
 r4:df911dc0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:608:4675 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:608   state:D stack:0     pid:4675  tgid:4675  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb259d84 r8:00000002 r7:60000013 r6:eb259d8c r5:8535bc00
 r4:8535bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8535bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84920c80
Exception stack(0xeb259fb0 to 0xeb259ff8)
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:609:4676 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:609   state:D stack:0     pid:4676  tgid:4676  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:8535a400
 r4:8535a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8535a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b45900
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8535a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb249000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85467f8c r4:85467c00
 r7:dddced40 r6:83018000 r5:85467f8c r4:84920d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920d00 r8:8027ed34 r7:eb259e60 r6:848ba980 r5:8535a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb25dfb0 to 0xeb25dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b45cc0
INFO: task kworker/0:609:4676 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
 r4:82abe1e4
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:610   state:D stack:0     pid:4679  tgid:4679  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d0700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8535b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb279000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85468b8c r4:85468800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85468b8c r4:84920d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8535b000 r8:84920dac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920d80 r8:8027ed34 r7:eb259e60 r6:848baa00 r5:8535b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb271fb0 to 0xeb271ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b45fc0
INFO: task kworker/0:610:4679 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r5:80000013 r4:80239bd0
 r4:df911dc0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b4e00
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:611:4680 blocked for more than 472 seconds.
 r4:8535c800
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r9:83018005 r8:8535c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546878c r4:85468400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546878c r4:84920e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8535c800 r8:84920e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920e00 r8:8027ed34 r7:eb271e60 r6:848baa80 r5:8535c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb27dfb0 to 0xeb27dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5f6c0
INFO: task kworker/0:611:4680 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8d1c7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:612:4683 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:612   state:D stack:0     pid:4683  tgid:4683  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb28dd84 r8:00000002 r7:60000113 r6:eb28dd8c r5:8535ec00
 r4:8535ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8535ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8535ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb295000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546938c r4:85469000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546938c r4:84920e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8535ec00 r8:84920eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920e80 r8:8027ed34 r7:eb271e60 r6:848bab00 r5:8535ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb28dfb0 to 0xeb28dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b5f240
INFO: task kworker/0:612:4683 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8d1c7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:613:4684 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:613   state:D stack:0     pid:4684  tgid:4684  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:8535d400
 r4:8535d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8535d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b690c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8535d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb285000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85468f8c r4:85468c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85468f8c r4:84920f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8535d400 r8:84920f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920f00 r8:8027ed34 r7:eb28de60 r6:848bab80 r5:8535d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb299fb0 to 0xeb299ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b69000
INFO: task kworker/0:613:4684 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8d68a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:614:4686 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:614   state:D stack:0     pid:4686  tgid:4686  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb2a1d84 r8:00000002 r7:60000013 r6:eb2a1d8c r5:84908c00
 r4:84908c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84908c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84908c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2cd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85469f8c r4:85469c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85469f8c r4:84920f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84908c00 r8:84920fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84920f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84920f80 r8:8027ed34 r7:eb28de60 r6:848bac00 r5:84908c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a1fb0 to 0xeb2a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b69100
INFO: task kworker/0:614:4686 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8da19000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:615:4688 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:615   state:D stack:0     pid:4688  tgid:4688  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:84908000
 r4:84908000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84908000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2a9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546978c r4:85469400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546978c r4:84b5a000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84908000 r8:84b5a02c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a000 r8:8027ed34 r7:eb2a1e60 r6:848bac80 r5:84908000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2b1fb0 to 0xeb2b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b691c0
INFO: task kworker/0:615:4688 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8dd59000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:616:4691 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:616   state:D stack:0     pid:4691  tgid:4691  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:8490a400
 r4:8490a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8490a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018005 r8:8490a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:8490a400 r8:84b5a0ac r7:82804d40 r6:dddced40 r5:dddced60
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a080 r8:8027ed34 r7:eb2a1e60 r6:848bad00 r5:8490a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c5fb0 to 0xeb2c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b691c0
INFO: task kworker/0:616:4691 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8e205000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:176:4693 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:176   state:D stack:0     pid:4693  tgid:4693  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:8490b000
 r4:8490b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8490b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492af80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8490b000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead13000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8497478c r4:84974400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8497478c r4:848bad80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8490b000 r8:848badac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:848bad80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:848bad80 r8:8027ed34 r7:eb1b1e60 r6:848bae00 r5:8490b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2adfb0 to 0xeb2adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8492a1c0
INFO: task kworker/1:176:4693 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8e4e8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/0:617:4694 blocked for more than 472 seconds.
 r5:8490bc00 r4:829185c0
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b699c0
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeb2d1fb0 to 0xeb2d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b693c0
INFO: task kworker/0:617:4694 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8e5a4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:618:4697 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:618   state:D stack:0     pid:4697  tgid:4697  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae8dd84 r8:00000002 r7:60000113 r6:eae8dd8c r5:8490c800
 r4:8490c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8490c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8490c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2d9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546a38c r4:8546a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546a38c r4:84b5a180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8490c800 r8:84b5a1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a180 r8:8027ed34 r7:eb2d1e60 r6:848baf00 r5:8490c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae8dfb0 to 0xeae8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b69680
INFO: task kworker/0:618:4697 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8e7a3000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:619:4698 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:619   state:D stack:0     pid:4698  tgid:4698  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:8490d400
 r4:8490d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8490d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b69b40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8490d400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe37000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546ab8c r4:8546a800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546ab8c r4:84b5a200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8490d400 r8:84b5a22c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a200 r8:8027ed34 r7:eb2d1e60 r6:848baf80 r5:8490d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e5fb0 to 0xeb2e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b69840
INFO: task kworker/0:619:4698 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8ea83000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:620   state:D stack:0     pid:4700  tgid:4700  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r9:83018005 r8:8490e000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
 r5:852cbb8c r4:852cb800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:852cbb8c r4:84b5a280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8490e000 r8:84b5a2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a280 r8:8027ed34 r7:eb2e5e60 r6:84930000 r5:8490e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e9fb0 to 0xeb2e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b696c0
INFO: task kworker/0:620:4700 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8ecd8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08
 r5:8546af8c r4:8546ac00
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:622:4707 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:622   state:D stack:0     pid:4707  tgid:4707  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:85480000
 r4:85480000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85480000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08
 r5:8546b38c r4:8546b000
 r4:00000001
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r4:00000000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:833b5d80
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:e0713000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8f91f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85482400 r8:84b5a4ac r7:82804d40 r6:dddced40 r5:dddced60
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:82abe1e4
 r4:00000000
 r5:84b1eb8c r4:84b1e800
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r5:84a0e000 r4:829185c0
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b000
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e88bb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546bf8c r4:8546bc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546bf8c r4:84b5a500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a0e000 r8:84b5a52c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a500 r8:8027ed34 r7:eb301e60 r6:84b5a580 r5:84a0e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2f1fb0 to 0xeb2f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b69dc0
INFO: task kworker/0:625:4711 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8fd0f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:626   state:D stack:0     pid:4714  tgid:4714  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849220c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea97f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546c38c r4:8546c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546c38c r4:84b5a600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a0ec00 r8:84b5a62c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a600 r8:8027ed34 r7:eb2f1e60 r6:84b5a680 r5:84a0ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2fdfb0 to 0xeb2fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7b800
INFO: task kworker/0:626:4714 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 8ffe2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:627:4715 blocked for more than 473 seconds.
task:kworker/0:627   state:D stack:0     pid:4715  tgid:4715  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84922280
 r9:83018005 r8:84a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9d9000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546c78c r4:8546c400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546c78c r4:84b5a700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a0d400 r8:84b5a72c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a700 r8:8027ed34 r7:eb2fde60 r6:84b5a780 r5:84a0d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb26dfb0 to 0xeb26dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b7b800
INFO: task kworker/0:627:4715 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 90666000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:628   state:D stack:0     pid:4718  tgid:4718  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:84a0bc00 r4:829185c0
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:eaa45000
 r5:8546cb8c r4:8546c800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546cb8c r4:84b5a800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a0bc00 r8:84b5a82c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a800 r8:8027ed34 r7:eb26de60 r6:84b5a880 r5:84a0bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb309fb0 to 0xeb309ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84922100
INFO: task kworker/0:628:4718 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 90666000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:84b1eb8c r4:84b1e800
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:629:4721 blocked for more than 473 seconds.
Workqueue: events bpf_prog_free_deferred
 r5:84a0c800 r4:829185c0
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:dddced40 r6:83018000 r5:8546cf8c r4:84b5a900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a0c800 r8:84b5a92c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5a900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5a900 r8:8027ed34 r7:eb309e60 r6:84b5a980 r5:84a0c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb311fb0 to 0xeb311ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84922200
INFO: task kworker/0:629:4721 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 90d3b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:630:4722 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:630   state:D stack:0     pid:4722  tgid:4722  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:84a0a400
 r4:84a0a400
 r5:84a0a400 r4:829185c0
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:849223c0
INFO: task kworker/0:630:4722 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 911ff000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:631:4724 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:631   state:D stack:0     pid:4724  tgid:4724  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r5:8542e000 r4:829185c0
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546d38c r4:84b5ab00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8542e000 r8:84b5ab2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5ab00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5ab00 r8:8027ed34 r7:eb315e60 r6:84b5ab80 r5:8542e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb319fb0 to 0xeb319ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:849225c0
INFO: task kworker/0:631:4724 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 91585000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:632:4725 blocked for more than 473 seconds.
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:849f8000 r8:84b5ac2c r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xeb31dfb0 to 0xeb31dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 91bc4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:633:4727 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:633   state:D stack:0     pid:4727  tgid:4727  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb321d84 r8:00000002 r7:60000013 r6:eb321d8c r5:849f8c00
 r4:849f8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84922e00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead2b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546df8c r4:8546dc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546df8c r4:84b5ad00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849f8c00 r8:84b5ad2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b5ad00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b5ad00 r8:8027ed34 r7:eb315e60 r6:84b5ad80 r5:849f8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb321fb0 to 0xeb321ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84922a40
INFO: task kworker/0:633:4727 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 91d77000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r5:849fb000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62040
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84b5ae00
Exception stack(0xeb329fb0 to 0xeb329ff8)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 921c2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:177:4732 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:177   state:D stack:0     pid:4732  tgid:4732  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:849fa400
 r4:849fa400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849fa400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492ca80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:849fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf57000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8497438c r4:84974000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8497438c r4:84930280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849fa400 r8:849302ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84930280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84930280 r8:8027ed34 r7:eb1b1e60 r6:84b5af00 r5:849fa400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb325fb0 to 0xeb325ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8492a980
INFO: task kworker/1:177:4732 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 921c2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:849fbc00
 r5:849fbc00 r4:829185c0
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:849fbc00 r8:84b5afac r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdf911d20 to 0xdf911d68)
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:636:4737 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:636   state:D stack:0     pid:4737  tgid:4737  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:849fc800
 r4:849fc800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849fc800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eade7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546eb8c r4:8546e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546eb8c r4:84b65080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849fc800 r8:84b650ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65080 r8:8027ed34 r7:eb329e60 r6:84b65100 r5:849fc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb30dfb0 to 0xeb30dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b621c0
INFO: task kworker/0:636:4737 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
1d60: 80000013 ffffffff
 r4:df911dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:637:4738 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:637   state:D stack:0     pid:4738  tgid:4738  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb331d84 r8:00000002 r7:60000013 r6:eb331d8c r5:849fd400
 r4:849fd400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849fd400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546ef8c r4:84b65180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849fd400 r8:84b651ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65180 r8:8027ed34 r7:eb30de60 r6:84b65200 r5:849fd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb331fb0 to 0xeb331ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b62100
INFO: task kworker/0:637:4738 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d60: 80000013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:849fe000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b625c0
 r5:8546f38c r4:8546f000
 r10:61c88647 r9:849fe000 r8:84b652ac r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xeb335fb0 to 0xeb335ff8)
 r4:84b622c0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 929a7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:639:4742 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:639   state:D stack:0     pid:4742  tgid:4742  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:849fec00
 r4:849fec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849fec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b627c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae41000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546f78c r4:8546f400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546f78c r4:84b65380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849fec00 r8:84b653ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65380 r8:8027ed34 r7:eb335e60 r6:84b65400 r5:849fec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb339fb0 to 0xeb339ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b623c0
INFO: task kworker/0:639:4742 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 92c65000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:640:4745 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:640   state:D stack:0     pid:4745  tgid:4745  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:849f9800
 r4:849f9800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849f9800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62a40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:849f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae7f000
 r5:8546ff8c r4:8546fc00
 r4:84b65480
Exception stack(0xeb33dfb0 to 0xeb33dff8)
INFO: task kworker/0:640:4745 is blocked on a mutex likely owned by task kworker/1:1:43.
Exception stack(0xdf911d20 to 0xdf911d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r4:833b5d80
task:kworker/0:641   state:D stack:0     pid:4746  tgid:4746  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:8542c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8542c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b628c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8542c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae5d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8546fb8c r4:8546f800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8546fb8c r4:84b65580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8542c800 r8:84b655ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65580 r8:8027ed34 r7:eb33de60 r6:84b65600 r5:8542c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb345fb0 to 0xeb345ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b62640
INFO: task kworker/0:641:4746 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 93438000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:642:4748 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:642   state:D stack:0     pid:4748  tgid:4748  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb341d84 r8:00000002 r7:60000113 r6:eb341d8c r5:84a08c00
 r4:84a08c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a08c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62c00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84a08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeab000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547838c r4:85478000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547838c r4:84b65680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a08c00 r8:84b656ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65680 r8:8027ed34 r7:eb33de60 r6:84b65700 r5:84a08c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb341fb0 to 0xeb341ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b62840
INFO: task kworker/0:642:4748 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 936bc000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:643:4750 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:643   state:D stack:0     pid:4750  tgid:4750  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84818000
 r4:84818000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84818000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84818000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaebf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547878c r4:85478400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547878c r4:84b65780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84818000 r8:84b657ac r7:82804d40 r6:dddced40 r5:dddced60
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80000013 r4:80239bd0
 r4:df911dc0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:644   state:D stack:0     pid:4753  tgid:4753  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:84818c00
 r4:84818c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84818c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b62ec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaef1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85478b8c r4:85478800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85478b8c r4:84b65880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84818c00 r8:84b658ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65880 r8:8027ed34 r7:eb349e60 r6:84b65900 r5:84818c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb34dfb0 to 0xeb34dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b62c40
INFO: task kworker/0:644:4753 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 93fab000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
 r4:df911dc0
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:645:4754 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:645   state:D stack:0     pid:4754  tgid:4754  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:84819800
 r4:84819800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84819800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907040
 r5:00001000 r4:eaf13000
 r7:dddced40 r6:83018000 r5:85478f8c r4:84b65980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84819800 r8:84b659ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65980 r8:8027ed34 r7:eb34de60 r6:84b65a00 r5:84819800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb351fb0 to 0xeb351ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
1d20: 9454a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb359d84 r8:00000002 r7:60000113 r6:eb359d8c r5:8481a400
 r4:8481a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8481a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8481a400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf25000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547938c r4:85479000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547938c r4:84b65a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8481a400 r8:84b65aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65a80 r8:8027ed34 r7:eb351e60 r6:84b65b00 r5:8481a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb359fb0 to 0xeb359ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b62cc0
INFO: task kworker/0:646:4755 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80000013 ffffffff
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:85484800 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85484800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafe7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85479b8c r4:85479800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85479b8c r4:84b65b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85484800 r8:84b65bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65b80 r8:8027ed34 r7:eb359e60 r6:84930300 r5:85484800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb365fb0 to 0xeb365ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907100
INFO: task kworker/0:647:4757 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 94c9f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:648:4759 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
 r4:85483000
 r5:85483000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:84b65c00 r8:8027ed34 r7:eb365e60 r6:84930380 r5:85483000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:849072c0
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:00000000
1d20: 94e0d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:649:4762 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:649   state:D stack:0     pid:4762  tgid:4762  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb355d84 r8:00000002 r7:60000013 r6:eb355d8c r5:85485400
 r4:85485400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85485400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907700
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85485400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafff000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85479f8c r4:85479c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85479f8c r4:84b65c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85485400 r8:84b65cac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65c80 r8:8027ed34 r7:eb365e60 r6:84930400 r5:85485400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb355fb0 to 0xeb355ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907300
INFO: task kworker/0:649:4762 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 950f1000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:178:4763 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:178   state:D stack:0     pid:4763  tgid:4763  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:85486000
 r4:85486000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85486000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6f00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85486000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac4f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f078c r4:853f0400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f078c r4:84930480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85486000 r8:849304ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84930480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84930480 r8:8027ed34 r7:eb1b1e60 r6:84930500 r5:85486000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb361fb0 to 0xeb361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8492ca40
Workqueue: events bpf_prog_free_deferred
1d20: 955a2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:179:4766 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:179   state:D stack:0     pid:4766  tgid:4766  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb371d84 r8:00000002 r7:60000113 r6:eb371d8c r5:85481800
 r4:85481800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85481800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492c740
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85481800 r8:849305ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 9575d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:650:4768 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:650   state:D stack:0     pid:4768  tgid:4768  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb35dd84 r8:00000002 r7:60000013 r6:eb35dd8c r5:8481bc00
 r4:8481bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8481bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907840
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8481bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb00f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547a38c r4:8547a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547a38c r4:84b65d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8481bc00 r8:84b65d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65d00 r8:8027ed34 r7:eb355e60 r6:84b65d80 r5:8481bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb35dfb0 to 0xeb35dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907580
INFO: task kworker/0:650:4768 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 95b33000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:651:4770 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:651   state:D stack:0     pid:4770  tgid:4770  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb36dd84 r8:00000002 r7:60000013 r6:eb36dd8c r5:8481c800
 r4:8481c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8481c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8547af8c r4:8547ac00
 r10:61c88647 r9:8481c800 r8:84b65e2c r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907580
INFO: task kworker/0:651:4770 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 95e72000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:652:4771 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:652   state:D stack:0     pid:4771  tgid:4771  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb375d84 r8:00000002 r7:60000013 r6:eb375d8c r5:8481d400
 r4:8481d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8481d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907a00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8481d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb027000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547a78c r4:8547a400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547a78c r4:84b65f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8481d400 r8:84b65f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b65f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b65f00 r8:8027ed34 r7:eb36de60 r6:84b65f80 r5:8481d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb375fb0 to 0xeb375ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907940
INFO: task kworker/0:652:4771 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 95e72000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:653:4773 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:653   state:D stack:0     pid:4773  tgid:4773  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:8481ec00
 r4:8481ec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8481ec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907b80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8481ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0a1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547ab8c r4:8547a800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547ab8c r4:854b8000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8481ec00 r8:854b802c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8000 r8:8027ed34 r7:eb36de60 r6:854b8080 r5:8481ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb37dfb0 to 0xeb37dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907b40
INFO: task kworker/0:653:4773 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 962ea000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:654:4776 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:654   state:D stack:0     pid:4776  tgid:4776  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb381d84 r8:00000002 r7:60000113 r6:eb381d8c r5:854e0000
 r4:854e0000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854e0000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a580
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa47000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547bb8c r4:8547b800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547bb8c r4:854b8100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854e0000 r8:854b812c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8100 r8:8027ed34 r7:eb36de60 r6:854b8180 r5:854e0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb381fb0 to 0xeb381ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907c00
INFO: task kworker/0:654:4776 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d20: 962ea000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:655:4777 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:655   state:D stack:0     pid:4777  tgid:4777  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb385d84 r8:00000002 r7:60000113 r6:eb385d8c r5:854e0c00
 r4:854e0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854e0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb177000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547b38c r4:8547b000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547b38c r4:854b8200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854e0c00 r8:854b822c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8200 r8:8027ed34 r7:eb381e60 r6:854b8280 r5:854e0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb385fb0 to 0xeb385ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907c00
INFO: task kworker/0:655:4777 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 966e8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:656:4780 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
 r4:85483c00
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8547b78c r4:8547b400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:854b8300 r8:8027ed34 r7:eb381e60 r6:84930680 r5:85483c00
dfa0:                                     00000000 00000000 00000000 00000000
 r4:84907f40
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 966e8000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:657:4783 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:657   state:D stack:0     pid:4783  tgid:4783  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb245d84 r8:00000002 r7:60000113 r6:eb245d8c r5:84909800
 r4:84909800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84909800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:854dcb8c r4:854dc800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:854b8380 r8:8027ed34 r7:eb381e60 r6:84930700 r5:84909800
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9697a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:658:4784 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:658   state:D stack:0     pid:4784  tgid:4784  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb24dd84 r8:00000002 r7:60000113 r6:eb24dd8c r5:85488000
 r4:85488000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85488000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba100
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85488000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd55000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547bf8c r4:8547bc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547bf8c r4:854b8400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85488000 r8:854b842c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8400 r8:8027ed34 r7:eb245e60 r6:84930780 r5:85488000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb24dfb0 to 0xeb24dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907f00
INFO: task kworker/0:658:4784 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 96bed000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:659:4786 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:659   state:D stack:0     pid:4786  tgid:4786  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb391d84 r8:00000002 r7:60000113 r6:eb391d8c r5:85489800
 r4:85489800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85489800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85489800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff33000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854dc38c r4:854dc000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:854dc38c r4:854b8500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85489800 r8:854b852c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8500 r8:8027ed34 r7:eb245e60 r6:84930800 r5:85489800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb391fb0 to 0xeb391ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854ba280
INFO: task kworker/0:659:4786 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:660:4788 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:660   state:D stack:0     pid:4788  tgid:4788  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:85488c00
 r4:00000000
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:661:4791 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:661   state:D stack:0     pid:4791  tgid:4791  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:8548b000
 r4:8548b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8548b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba2c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8548b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e055b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854dcf8c r4:854dcc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:854dcf8c r4:854b8580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8548b000 r8:854b85ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8580 r8:8027ed34 r7:eb399e60 r6:84930900 r5:8548b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3a1fb0 to 0xeb3a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 97497000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:662:4793 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:662   state:D stack:0     pid:4793  tgid:4793  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:8548a400
 r4:8548a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8548a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba7c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8548a400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e4801000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854dd38c r4:854dd000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:854dd38c r4:854b8600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8548a400 r8:854b862c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8600 r8:8027ed34 r7:eb399e60 r6:84930980 r5:8548a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3a9fb0 to 0xeb3a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:854ba4c0
Call trace: 
1d60: 80000013 ffffffff
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:663:4796 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:663   state:D stack:0     pid:4796  tgid:4796  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:8548bc00
 r4:8548bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8548bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854baa40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8548bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaf3000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:854b8680 r8:8027ed34 r7:eb399e60 r6:84930a00 r5:8548bc00
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:664:4797 blocked for more than 474 seconds.
Workqueue: events bpf_prog_free_deferred
 r4:8548c800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8548c800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854baf00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8548c800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac81000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:854b8700 r8:8027ed34 r7:eb3b5e60 r6:84930a80 r5:8548c800
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abe1e4
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bab80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8548d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabb5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854ddf8c r4:854ddc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:854ddf8c r4:854b8780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8548d400 r8:854b87ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8780 r8:8027ed34 r7:eb3b9e60 r6:84930b00 r5:8548d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c5fb0 to 0xeb3c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854ba8c0
INFO: task kworker/0:665:4800 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 97cda000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bad00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85486c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac11000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854de38c r4:854de000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:854de38c r4:854b8800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85486c00 r8:854b882c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8800 r8:8027ed34 r7:eb3b9e60 r6:84930b80 r5:85486c00
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
1d20: 9806e000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b1eb8c r4:84b1e800
 r4:833b4e00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492c300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8548ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1ef000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f0f8c r4:853f0c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f0f8c r4:84930c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8548ec00 r8:84930c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84930c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84930c00 r8:8027ed34 r7:eb361e60 r6:84930c80 r5:8548ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb389fb0 to 0xeb389ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854c6d80
INFO: task kworker/1:180:4804 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 98626000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:df911dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:667:4805 blocked for more than 474 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:8548e000
 r4:8548e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8548e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r4:00000000
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:668:4808 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:668   state:D stack:0     pid:4808  tgid:4808  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:8535e000
 r4:8535e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8535e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0540
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8535e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:854df78c r4:854df400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:854b8900
Exception stack(0xeb3d1fb0 to 0xeb3d1ff8)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:181:4809 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:181   state:D stack:0     pid:4809  tgid:4809  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:85490000
 r5:85490000 r4:829185c0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6140
 r9:83018205 r8:85490000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
 r5:853f0b8c r4:853f0800
Exception stack(0xeb3d5fb0 to 0xeb3d5ff8)
Workqueue: events bpf_prog_free_deferred
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:669:4810 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:669   state:D stack:0     pid:4810  tgid:4810  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3d9d84 r8:00000002 r7:60000013 r6:eb3d9d8c r5:85490c00
 r4:85490c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85490c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0080
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb067000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854def8c r4:854dec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:854b8980
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1d20: 989df000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:670:4812 blocked for more than 475 seconds.
Call trace: 
 r5:85492400 r4:829185c0
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:182:4816 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:182   state:D stack:0     pid:4816  tgid:4816  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:85493000
 r4:85493000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85493000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4b80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb44f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f238c r4:853f2000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:8492c240
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
INFO: task kworker/1:183:4817 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:183   state:D stack:0     pid:4817  tgid:4817  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:85493c00
 r4:85493c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85493c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85493c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb273000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f138c r4:853f1000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f138c r4:854d8100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85493c00 r8:854d812c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d20: 990d4000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
INFO: task kworker/0:671:4818 blocked for more than 475 seconds.
 r5:85494800 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0600
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85494800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb207000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:854dfb8c r4:854df800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:854dfb8c r4:854b8a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85494800 r8:854b8aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8a80 r8:8027ed34 r7:eb3d1e60 r6:854d8200 r5:85494800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3e5fb0 to 0xeb3e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
INFO: task kworker/0:672:4821 blocked for more than 475 seconds.
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8551878c r4:85518400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551878c r4:854b8b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85495400 r8:854b8b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8b00 r8:8027ed34 r7:eb3e5e60 r6:854d8280 r5:85495400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3f1fb0 to 0xeb3f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854d0480
INFO: task kworker/0:672:4821 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 99732000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:85496c00 r8:854b8bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8b80 r8:8027ed34 r7:eb3f1e60 r6:854d8300 r5:85496c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3f5fb0 to 0xeb3f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854d05c0
INFO: task kworker/0:673:4822 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 99c49000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:df911dc0
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b5d80
 r5:85498c00 r4:829185c0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:854b8c80
Exception stack(0xeb415fb0 to 0xeb415ff8)
Workqueue: events bpf_prog_free_deferred
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:675:4826 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:675   state:D stack:0     pid:4826  tgid:4826  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb419d84 r8:00000002 r7:60000013 r6:eb419d8c r5:85499800
 r4:85499800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85499800 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r5:00001000 r4:eb253000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
Exception stack(0xeb419fb0 to 0xeb419ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854d0880
INFO: task kworker/0:675:4826 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
INFO: task kworker/0:676:4828 blocked for more than 475 seconds.
 r5:8549a400 r4:829185c0
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0e40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8549a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb29d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551938c r4:85519000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551938c r4:854b8d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8549a400 r8:854b8dac r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854b8d80 r8:8027ed34 r7:eb419e60 r6:854d8480 r5:8549a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:184:4831 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:184   state:D stack:0     pid:4831  tgid:4831  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:8549b000
 r4:8549b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8549b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r10:61c88647 r9:8549b000 r8:854d852c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:854d4700
Exception stack(0xdf911d20 to 0xdf911d68)
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:8549bc00
 r4:8549bc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8549bc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4c40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8549bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb28f000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f1b8c r4:853f1800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f1b8c r4:854d8600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8549bc00 r8:854d862c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:854d8600 r8:8027ed34 r7:eb3c1e60 r6:854d8680 r5:8549bc00
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:00000001
task:kworker/0:677   state:D stack:0     pid:4834  tgid:4834  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0f40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8549c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2b3000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551978c r4:85519400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551978c r4:854b8e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8549c800 r8:854b8e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:854b8e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:854d09c0
1d20: 9ab07000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:833b5d80
 r4:8549d400
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8549d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb443000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f1f8c r4:853f1c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f1f8c r4:854d8780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8549d400 r8:854d87ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:854d8780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d8780 r8:8027ed34 r7:eb3c1e60 r6:854d8800 r5:8549d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb429fb0 to 0xeb429ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854d4b80
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b5d80
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0fc0
 r5:85519b8c r4:85519800
 r10:00000000 r9:854b8e80 r8:8027ed34 r7:eb421e60 r6:854d8880 r5:8549e000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854d0f80
INFO: task kworker/0:678:4839 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9b1ff000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
      Not tainted 6.16.0-rc3-syzkaller #0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08
 r5:8551af8c r4:8551ac00
 r4:00000001
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:680:4842 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:680   state:D stack:0     pid:4842  tgid:4842  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3e9d84 r8:00000002 r7:60000013 r6:eb3e9d8c r5:854e3c00
 r4:854e3c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854e3c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0240
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xeb3e9fb0 to 0xeb3e9ff8)
Workqueue: events bpf_prog_free_deferred
 r4:82abe1e4
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
1fa0:                                     00000000 00000000 00000000 00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba080
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2db000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551a38c r4:8551a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551a38c r4:8519f080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854e6000 r8:8519f0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f080 r8:8027ed34 r7:eb439e60 r6:8519f100 r5:854e6000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:681:4844 is blocked on a mutex likely owned by task kworker/1:1:43.
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/0:682   state:D stack:0     pid:4845  tgid:4845  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:854e6c00 r8:8519f1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f180 r8:8027ed34 r7:eb439e60 r6:8519f200 r5:854e6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb441fb0 to 0xeb441ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854ba300
INFO: task kworker/0:682:4845 is blocked on a mutex likely owned by task kworker/1:1:43.
 r4:82abe1e4
 r4:00000000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
      Not tainted 6.16.0-rc3-syzkaller #0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:854d4380
INFO: task kworker/1:187:4848 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9bd65000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:188:4850 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
task:kworker/1:188   state:D stack:0     pid:4850  tgid:4850  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r10:61c88647 r9:85491800 r8:854d8aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
INFO: task kworker/1:188:4850 is blocked on a mutex likely owned by task kworker/1:1:43.
1d60: 80000013 ffffffff
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:854a0000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:8518e3c0
INFO: task kworker/0:683:4853 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9c060000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:189:4854 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:189   state:D stack:0     pid:4854  tgid:4854  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:854a0c00
 r4:854a0c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a0c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f400
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:854d8b80 r8:8027ed34 r7:eb435e60 r6:854d8c80 r5:854a0c00
INFO: task kworker/1:189:4854 is blocked on a mutex likely owned by task kworker/1:1:43.
 r5:80000013 r4:80239bd0
 r4:df911dc0
 r5:00001000 r4:dfeeb000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
1fa0:                                     00000000 00000000 00000000 00000000
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:684:4857 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:684   state:D stack:0     pid:4857  tgid:4857  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:854a3000
 r4:854a3000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a3000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ed40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06dd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551c38c r4:8551c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551c38c r4:8519f300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a3000 r8:8519f32c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f300 r8:8027ed34 r7:eb439e60 r6:854d8d00 r5:854a3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb491fb0 to 0xeb491ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518e600
INFO: task kworker/0:684:4857 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9c435000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:833b4e00
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:685   state:D stack:0     pid:4858  tgid:4858  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:854a3c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a3c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbb7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551b38c r4:8551b000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551b38c r4:8519f380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a3c00 r8:8519f3ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f380 r8:8027ed34 r7:eb491e60 r6:854d8d80 r5:854a3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb495fb0 to 0xeb495ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518e600
INFO: task kworker/0:685:4858 is blocked on a mutex likely owned by task kworker/1:1:43.
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:df911dc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r10:61c88647 r9:854a4800 r8:8519f42c r7:82804d40 r6:dddced40 r5:dddced60
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:687:4863 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:687   state:D stack:0     pid:4863  tgid:4863  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb4a1d84 r8:00000002 r7:60000013 r6:eb4a1d8c r5:854a1800
 r4:854a1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ebc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e062b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551bf8c r4:8551bc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551bf8c r4:8519f480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a1800 r8:8519f4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdf911d20 to 0xdf911d68)
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:688:4865 blocked for more than 475 seconds.
 r10:829185c4 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:854a6000
 r4:854a6000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a6000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f300
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaab1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551d78c r4:8551d400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551d78c r4:8519f500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a6000 r8:8519f52c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f500 r8:8027ed34 r7:eb491e60 r6:854d8f00 r5:854a6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a9fb0 to 0xeb4a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518ed00
INFO: task kworker/0:688:4865 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9cd1f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:689:4867 blocked for more than 476 seconds.
 r5:854a5400 r4:829185c0
 r4:00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518eec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0779000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551c78c r4:8551c400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551c78c r4:8519f580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a5400 r8:8519f5ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f580 r8:8027ed34 r7:eb4a9e60 r6:854d8f80 r5:854a5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b1fb0 to 0xeb4b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8518eac0
INFO: task kworker/0:689:4867 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:690:4869 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:690   state:D stack:0     pid:4869  tgid:4869  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:854a6c00
 r4:854a6c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a6c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:dddced40 r6:83018000 r5:8551cb8c r4:8519f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a6c00 r8:8519f62c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f600 r8:8027ed34 r7:eb4a9e60 r6:850aa000 r5:854a6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fa0:                                     00000000 00000000 00000000 00000000
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:691:4871 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:691   state:D stack:0     pid:4871  tgid:4871  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:854a2400
 r4:854a2400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a2400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e180
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea997000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551cf8c r4:8551cc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551cf8c r4:8519f680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a2400 r8:8519f6ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f680
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f040
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa2d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551d38c r4:8551d000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551d38c r4:8519f700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a8c00 r8:8519f72c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f700 r8:8027ed34 r7:eb4a9e60 r6:850aa100 r5:854a8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c9fb0 to 0xeb4c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516f080
INFO: task kworker/0:692:4873 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdf911d20 to 0xdf911d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551df8c r4:8551dc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551df8c r4:8519f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854a8000 r8:8519f7ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f780 r8:8027ed34 r7:eb4a9e60 r6:850aa180 r5:854a8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d1fb0 to 0xeb4d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516f080
INFO: task kworker/0:693:4875 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9d9d7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:694:4877 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:694   state:D stack:0     pid:4877  tgid:4877  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb4d9d84 r8:00000002 r7:60000013 r6:eb4d9d8c r5:854a9800
 r4:854a9800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854a9800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
9fa0:                                     00000000 00000000 00000000 00000000
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:190   state:D stack:0     pid:4880  tgid:4880  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:854ab000
 r4:854ab000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854ab000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516d140
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:854ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb579000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f378c r4:853f3400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f378c r4:850aa280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854ab000 r8:850aa2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850aa280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850aa280 r8:8027ed34 r7:eb435e60 r6:850aa300 r5:854ab000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:191:4881 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:191   state:D stack:0     pid:4881  tgid:4881  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb459d84 r8:00000002 r7:60000113 r6:eb459d8c r5:854abc00
 r4:854abc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854abc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a8d80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:854abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead15000
 r5:853f2f8c r4:853f2c00
 r4:850aa380
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9e27f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:833b5d80
task:kworker/1:192   state:D stack:0     pid:4883  tgid:4883  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:850aa480
 r4:851a8140
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
INFO: task kworker/0:695:4885 blocked for more than 476 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb4e5d84 r8:00000002 r7:60000013 r6:eb4e5d8c r5:854ae000
 r4:854ae000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854ae000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f840
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8551e38c r4:8551e000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:829185c4 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:854ad400
 r4:854ad400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854ad400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516fa00
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae13000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551e78c r4:8551e400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551e78c r4:8519f900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854ad400 r8:8519f92c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519f900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f900 r8:8027ed34 r7:eb4d9e60 r6:850aa600 r5:854ad400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e9fb0 to 0xeb4e9ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d20: 9eb53000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:697:4891 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:697   state:D stack:0     pid:4891  tgid:4891  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb4f5d84 r8:00000002 r7:60000013 r6:eb4f5d8c r5:85498000
 r4:85498000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85498000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:8551ef8c r4:8551ec00
 r4:8519f980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519f980 r8:8027ed34 r7:eb4d9e60 r6:850aa680 r5:85498000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4f5fb0 to 0xeb4f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516f900
INFO: task kworker/0:697:4891 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80000013 ffffffff
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:698   state:D stack:0     pid:4893  tgid:4893  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000001
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:699:4895 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:699   state:D stack:0     pid:4895  tgid:4895  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb505d84 r8:00000002 r7:60000113 r6:eb505d8c r5:85552400
 r4:85552400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85552400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516fd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Workqueue: events bpf_prog_free_deferred
 r4:df911dc0
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r5:85550000 r4:829185c0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516fec0
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8551f78c r4:8551f400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8551f78c r4:8519fb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85550000 r8:8519fb2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519fb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519fb00 r8:8027ed34 r7:eb4fde60 r6:850aa800 r5:85550000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb50dfb0 to 0xeb50dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516fb80
INFO: task kworker/0:700:4897 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: 9f8c5000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:701:4898 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:701   state:D stack:0     pid:4898  tgid:4898  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb511d84 r8:00000002 r7:60000113 r6:eb511d8c r5:85551800
 r4:85551800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85551800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516f640
 r5:8551fb8c r4:8551f800
 r4:8519fb80
1fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
1d60: 80000013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:193:4901 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:193   state:D stack:0     pid:4901  tgid:4901  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:85555400
 r4:85555400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85555400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516d280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:85555400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb581000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853f3b8c r4:853f3800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f3b8c r4:850aa900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:850aa900
INFO: task kworker/1:193:4901 is blocked on a mutex likely owned by task kworker/1:1:43.
Exception stack(0xdf911d20 to 0xdf911d68)
 r4:df911dc0
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:702:4902 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:702   state:D stack:0     pid:4902  tgid:4902  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:85556000
 r4:85556000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85556000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8519fc00
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: a0809000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:703:4903 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:703   state:D stack:0     pid:4903  tgid:4903  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:85553000
 r4:85553000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85553000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8519fc80 r8:8027ed34 r7:eb4fde60 r6:850aaa80 r5:85553000
 r4:8516ffc0
Call trace: 
Exception stack(0xdf911d20 to 0xdf911d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:704:4905 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:704   state:D stack:0     pid:4905  tgid:4905  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:85553c00
 r4:85553c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85553c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078280
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:85520b8c r4:8519fd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85553c00 r8:8519fd2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519fd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519fd00 r8:8027ed34 r7:eb4fde60 r6:850aab00 r5:85553c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb529fb0 to 0xeb529ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516f180
INFO: task kworker/0:704:4905 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:705   state:D stack:0     pid:4908  tgid:4908  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85521f8c r4:85521c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85521f8c r4:8519fd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854aa400 r8:8519fdac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519fd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519fd80 r8:8027ed34 r7:eb529e60 r6:850aab80 r5:854aa400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb535fb0 to 0xeb535ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85078100
INFO: task kworker/0:705:4908 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a14c0000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:706:4909 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:706   state:D stack:0     pid:4909  tgid:4909  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:854aec00
 r4:854aec00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854aec00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078380
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:854aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaff7000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85520f8c r4:85520c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85520f8c r4:8519fe00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854aec00 r8:8519fe2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519fe00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519fe00 r8:8027ed34 r7:eb535e60 r6:850aac00 r5:854aec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb539fb0 to 0xeb539ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
1d60: 80000013 ffffffff
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:707:4911 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:707   state:D stack:0     pid:4911  tgid:4911  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb541d84 r8:00000002 r7:60000113 r6:eb541d8c r5:85558000
 r4:85558000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85558000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85558000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb019000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552138c r4:85521000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552138c r4:8519fe80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85558000 r8:8519feac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519fe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519fe80 r8:8027ed34 r7:eb535e60 r6:850aac80 r5:85558000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb541fb0 to 0xeb541ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850783c0
INFO: task kworker/0:707:4911 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a1764000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8555a400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:8519ff00
dfa0:                                     00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85078400
INFO: task kworker/0:708:4914 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a1c08000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb551fb0 to 0xeb551ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85078480
INFO: task kworker/0:709:4915 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a2367000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:710:4918 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
task:kworker/0:710   state:D stack:0     pid:4918  tgid:4918  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r7:dddced40 r6:83018000 r5:85522b8c r4:8519d000
Workqueue: events bpf_prog_free_deferred
 r4:df911dc0
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:711:4919 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:711   state:D stack:0     pid:4919  tgid:4919  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:8555b000
 r4:8555b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8555b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8552238c r4:85522000
 r4:8519d080
 r10:00000000 r9:8519d080 r8:8027ed34 r7:eb55de60 r6:850aae80 r5:8555b000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb561fb0 to 0xeb561ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85078780
INFO: task kworker/0:711:4919 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a2c83000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
 r4:82abe1e4
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8519d100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519d100 r8:8027ed34 r7:eb55de60 r6:850aaf00 r5:8555bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb56dfb0 to 0xeb56dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85078940
INFO: task kworker/0:712:4921 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a2e26000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r5:00001000 r4:dfeeb000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:713   state:D stack:0     pid:4923  tgid:4923  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fa0:                                     00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85078940
INFO: task kworker/0:713:4923 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a3410000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r5:8555e000 r4:829185c0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:853f3f8c r4:853f3c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:853f3f8c r4:85170000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8555e000 r8:8517002c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85170000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170000 r8:8027ed34 r7:eb51de60 r6:85170080 r5:8555e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb519fb0 to 0xeb519ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516d100
INFO: task kworker/1:194:4927 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d20: a3410000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:00000000
 r5:00001000 r4:dfeeb000
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:8552338c r4:85523000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552338c r4:8519d200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
 r4:85078ac0
Call trace: 
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:196:4934 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:196   state:D stack:0     pid:4934  tgid:4934  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb261d84 r8:00000002 r7:60000113 r6:eb261d8c r5:849b8000
 r4:849b8000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b8000 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:85170280
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
INFO: task kworker/0:715:4935 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:715   state:D stack:0     pid:4935  tgid:4935  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb3add84 r8:00000002 r7:60000013 r6:eb3add8c r5:849b8c00
 r4:849b8c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b8c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc42c0
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911d20 to 0xdf911d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:829185c4 r9:eb449d84 r8:00000002 r7:60000013 r6:eb449d8c r5:849b9800
 r4:00000000
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85523f8c r4:85523c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85523f8c r4:8519d300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b9800 r8:8519d32c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519d300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519d300 r8:8027ed34 r7:eb3ade60 r6:85170400 r5:849b9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb449fb0 to 0xeb449ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc4140
INFO: task kworker/0:716:4936 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
Exception stack(0xdf911fb0 to 0xdf911ff8)
Call trace: 
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r5:00001000 r4:eaad5000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Call trace: 
 r4:df911dc0
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:718:4942 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:718   state:D stack:0     pid:4942  tgid:4942  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:849bbc00
 r4:849bbc00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849bbc00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Workqueue: events bpf_prog_free_deferred
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r4:849bc800
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85524f8c r4:85524c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85524f8c r4:8519d480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849bc800 r8:8519d4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519d480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519d480 r8:8027ed34 r7:eb20de60 r6:85170580 r5:849bc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb475fb0 to 0xeb475ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc4400
INFO: task kworker/0:719:4943 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a52d2000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
 r4:df911dc0
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
INFO: task kworker/0:720:4945 blocked for more than 477 seconds.
 r5:849be000 r4:829185c0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849be000 r8:8519d52c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519d500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519d500 r8:8027ed34 r7:eb475e60 r6:85170600 r5:849be000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a1fb0 to 0xeb5a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc4580
INFO: task kworker/0:720:4945 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a5576000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
      Not tainted 6.16.0-rc3-syzkaller #0
 r5:849bd400 r4:829185c0
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4b40
 r5:8552538c r4:85525000
 r4:8519d580
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84bc4840
INFO: task kworker/0:721:4947 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a5b99000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08
 r5:8559278c r4:85592400
 r10:00000000 r9:85170700 r8:8027ed34 r7:eb261e60 r6:85170780 r5:85554800
 r4:8516dfc0
Exception stack(0xdf911d20 to 0xdf911d68)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:722:4950 blocked for more than 477 seconds.
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xeb5b5fb0 to 0xeb5b5ff8)
 r4:84bc4800
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:00000000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
INFO: task kworker/0:723:4952 blocked for more than 477 seconds.
 r5:849bec00 r4:829185c0
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r10:61c88647 r9:849bec00 r8:8519d6ac r7:82804d40 r6:dddced40 r5:dddced60
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:198:4955 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:198   state:D stack:0     pid:4955  tgid:4955  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:849bb000
 r4:849bb000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849bb000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a10c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb659000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84974b8c r4:84974800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84974b8c r4:85170900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849bb000 r8:8517092c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85170900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170900 r8:8027ed34 r7:eb5b1e60 r6:85170980 r5:849bb000
 r4:00000001
Exception stack(0xeb215fb0 to 0xeb215ff8)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r5:00001000 r4:eb1f1000
 r5:85525f8c r4:85525c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85525f8c r4:8519d700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85560c00 r8:8519d72c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519d700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519d700 r8:8027ed34 r7:eb5bde60 r6:85170a00 r5:85560c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c5fb0 to 0xeb5c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc4c80
INFO: task kworker/0:724:4957 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a68ee000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdf911fb0 to 0xdf911ff8)
INFO: task kworker/0:725:4960 blocked for more than 477 seconds.
Call trace: 
 r5:85560000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096040
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:85560000 r8:8519d7ac r7:82804d40 r6:dddced40 r5:dddced60
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a6d97000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:726:4961 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:726   state:D stack:0     pid:4961  tgid:4961  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb5d5d84 r8:00000002 r7:60000113 r6:eb5d5d8c r5:85563000
 r4:85563000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85563000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4b80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85563000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb203000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552638c r4:85526000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552638c r4:8519d800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85563000 r8:8519d82c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519d800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519d800 r8:8027ed34 r7:eb5d1e60 r6:85170b00 r5:85563000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d5fb0 to 0xeb5d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bc4f40
INFO: task kworker/0:726:4961 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
1d60: 80000013 ffffffff
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:727:4962 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:727   state:D stack:0     pid:4962  tgid:4962  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:85561800
 r4:85561800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85561800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516d4c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85561800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb219000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552678c r4:85526400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552678c r4:8519d880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85561800 r8:8519d8ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519d880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519d880 r8:8027ed34 r7:eb5d1e60 r6:85170b80 r5:85561800
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r5:85565400 r4:829185c0
 r9:83018005 r8:85565400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a7508000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r5:85564800 r4:829185c0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096400
 r10:00000000 r9:8519d980 r8:8027ed34 r7:eb5e5e60 r6:85170c80 r5:85564800
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85096180
INFO: task kworker/0:729:4968 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a7828000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:730:4969 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:85566000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:00000000
 r4:df911dc0
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:731:4971 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:731   state:D stack:0     pid:4971  tgid:4971  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb5fdd84 r8:00000002 r7:60000113 r6:eb5fdd8c r5:85566c00
 r4:85566c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85566c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096940
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Call trace: 
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:732   state:D stack:0     pid:4972  tgid:4972  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:829185c4 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85568000
 r4:85568000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85568000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096680
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85568000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb293000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85527b8c r4:85527800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85527b8c r4:8519db00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85568000 r8:8519db2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519db00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519db00 r8:8027ed34 r7:eb5fde60 r6:85170e00 r5:85568000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb601fb0 to 0xeb601ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:850965c0
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:733:4974 blocked for more than 477 seconds.
task:kworker/0:733   state:D stack:0     pid:4974  tgid:4974  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8519db80 r8:8027ed34 r7:eb5fde60 r6:85170e80 r5:85569800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb609fb0 to 0xeb609ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850965c0
INFO: task kworker/0:733:4974 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a8442000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:84b1eb8c r4:84b1e800
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
Exception stack(0xeb615fb0 to 0xeb615ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xdf911d20 to 0xdf911d68)
1d60: 80000013 ffffffff
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:833b4e00
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:735:4979 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:735   state:D stack:0     pid:4979  tgid:4979  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:8556b000
 r4:8556b000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8556b000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096e40
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8556b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3b1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552938c r4:85529000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552938c r4:8519dc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8556b000 r8:8519dcac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8519dc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8519dc80 r8:8027ed34 r7:eb615e60 r6:85170f80 r5:8556b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb61dfb0 to 0xeb61dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850967c0
INFO: task kworker/0:735:4979 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a8d76000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
 r4:00000001
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r4:854e2400
 r5:854e2400 r4:829185c0
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85528b8c r4:85528800
 r7:dddced40 r6:83018000 r5:85528b8c r4:8519dd00
 r10:00000000 r9:8519dd00 r8:8027ed34 r7:eb61de60 r6:8519dd80 r5:854e2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b9fb0 to 0xeb5b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850967c0
INFO: task kworker/0:736:4980 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: a8eca000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8519de00
9fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b1eb8c r4:84b1e800
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:854e5400 r8:8519df2c r7:82804d40 r6:dddced40 r5:dddced60
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:739:4987 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:739   state:D stack:0     pid:4987  tgid:4987  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:854e1800
 r4:854e1800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:854e1800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:85096e80
 r4:00000000
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
      Not tainted 6.16.0-rc3-syzkaller #0
 r4:854e3000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f040
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb42d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85529b8c r4:85529800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85529b8c r4:84bdf100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:854e3000 r8:84bdf12c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdf100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdf100 r8:8027ed34 r7:eb629e60 r6:84bdf180 r5:854e3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb62dfb0 to 0xeb62dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8508f000
INFO: task kworker/0:740:4989 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: aa1ba000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r9:83018005 r8:8481b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb46d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552a38c r4:8552a000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552a38c r4:84bdf200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8481b000 r8:84bdf22c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdf200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdf200 r8:8027ed34 r7:eb629e60 r6:84bdf280 r5:8481b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb631fb0 to 0xeb631ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8508f1c0
INFO: task kworker/0:741:4991 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:833b5d80
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:8481e000
 r4:8481e000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8481e000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f5c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8481e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb595000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552a78c r4:8552a400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552a78c r4:84bdf300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8481e000 r8:84bdf32c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdf300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdf300 r8:8027ed34 r7:eb631e60 r6:84bdf380 r5:8481e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb635fb0 to 0xeb635ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8508f300
INFO: task kworker/0:742:4994 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d20: aa9b7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r5:84b1eb8c r4:84b1e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
 r4:84810000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84810000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84810000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb641000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552ab8c r4:8552a800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552ab8c r4:84bdf400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84810000 r8:84bdf42c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdf400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdf400 r8:8027ed34 r7:eb635e60 r6:84bdf480 r5:84810000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb639fb0 to 0xeb639ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8508f300
INFO: task kworker/0:743:4995 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: aab6a000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:744:4997 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:744   state:D stack:0     pid:4997  tgid:4997  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r4:84810c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fcc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb679000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552b78c r4:8552b400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552b78c r4:84bdf500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84810c00 r8:84bdf52c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdf500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdf500 r8:8027ed34 r7:eb639e60 r6:84bdf580 r5:84810c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb645fb0 to 0xeb645ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8508f600
INFO: task kworker/0:744:4997 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: aaf3d000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:745   state:D stack:0     pid:4999  tgid:4999  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:8556a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f8c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8556a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb64d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552af8c r4:8552ac00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552af8c r4:84bdf600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8556a400 r8:84bdf62c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdf600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdf600 r8:8027ed34 r7:eb645e60 r6:855aa000 r5:8556a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb65dfb0 to 0xeb65dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8508f600
INFO: task kworker/0:745:4999 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:df911dc0
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:829185c4 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:8556bc00
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fbc0
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:dddced40 r6:83018000 r5:8552b38c r4:84bdf680
 r10:00000000 r9:84bdf680 r8:8027ed34 r7:eb645e60 r6:855aa080 r5:8556bc00
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:199:5002 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:199   state:D stack:0     pid:5002  tgid:5002  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:8556d400
 r4:8556d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8556d400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ac840
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:8556d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb823000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84975b8c r4:84975800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84975b8c r4:855aa100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8556d400 r8:855aa12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:855aa100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855aa100 r8:8027ed34 r7:eb5b1e60 r6:855aa180 r5:8556d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb651fb0 to 0xeb651ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace: 
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r5:8556ec00 r4:829185c0
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:8552bb8c r4:8552b800
 r10:00000000 r9:84bdf700 r8:8027ed34 r7:eb645e60 r6:855aa200 r5:8556ec00
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:748:5008 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:748   state:D stack:0     pid:5008  tgid:5008  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb6a5d84 r8:00000002 r7:60000013 r6:eb6a5d8c r5:85562400
 r4:85562400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85562400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fec0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85562400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb68d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8552bf8c r4:8552bc00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8552bf8c r4:84bdf780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85562400 r8:84bdf7ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdf780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8508fc40
INFO: task kworker/0:748:5008 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: abf76000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84bdf800 r8:8027ed34 r7:eb6a5e60 r6:855aa300 r5:8556c800
 r4:8508fc40
 r4:00000000
 r4:82abe1e4
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:750:5010 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:750   state:D stack:0     pid:5010  tgid:5010  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:84811800
 r4:84811800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84811800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84811800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb69d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553438c r4:85534000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553438c r4:84bdf880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:00000000
 r4:82abe1e4
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:751:5012 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:751   state:D stack:0     pid:5012  tgid:5012  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb685d84 r8:00000002 r7:60000013 r6:eb685d8c r5:84812400
 r4:84812400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84812400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078e80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84812400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6ad000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553478c r4:85534400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553478c r4:84bdf980
 r10:00000000 r9:84bdf980 r8:8027ed34 r7:eb6b1e60 r6:84bdfa00 r5:84812400
 r4:8508ff80
Call trace: 
1d60: 80000013 ffffffff
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:752:5014 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:752   state:D stack:0     pid:5014  tgid:5014  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:84813000
 r4:84813000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84813000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af240
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84813000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6bd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85534b8c r4:85534800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85534b8c r4:84bdfa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84813000 r8:84bdfaac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdfa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdfa80 r8:8027ed34 r7:eb6b1e60 r6:84bdfb00 r5:84813000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6b5fb0 to 0xeb6b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8508ff80
Call trace: 
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:84813c00
 r4:84813c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84813c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af340
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84813c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6c5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85534f8c r4:85534c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85534f8c r4:84bdfb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84813c00 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdfb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:eb6b1e60 r6:84bdfc00 r5:84813c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a1fb0 to 0xeb6a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855af140
INFO: task kworker/0:753:5018 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: ad434000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:754   state:D stack:0     pid:5019  tgid:5019  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb6c9d84 r8:00000002 r7:60000113 r6:eb6c9d8c r5:84814800
 r4:84814800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84814800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af480
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84814800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6d1000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553538c r4:85535000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553538c r4:84bdfc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84814800 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdfc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:eb6b1e60 r6:84bdfd00 r5:84814800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Exception stack(0xdf911d20 to 0xdf911d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84815400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855af640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84815400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6dd000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553578c r4:85535400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553578c r4:84bdfd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84815400 r8:84bdfdac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdfd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdfd80 r8:8027ed34 r7:eb6b1e60 r6:84bdfe00 r5:84815400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6d5fb0 to 0xeb6d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855af4c0
INFO: task kworker/0:755:5021 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80000013 ffffffff
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:756   state:D stack:0     pid:5023  tgid:5023  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb6edd84 r8:00000002 r7:60000013 r6:eb6edd8c r5:84816000
 r4:84816000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84816000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afa80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84816000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa6b000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553638c r4:85536000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553638c r4:84bdfe80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84816000 r8:84bdfeac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84bdfe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bdfe80 r8:8027ed34 r7:eb6b1e60 r6:84bdff00 r5:84816000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6edfb0 to 0xeb6edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855af5c0
INFO: task kworker/0:756:5023 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: ae25b000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:757:5025 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:757   state:D stack:0     pid:5025  tgid:5025  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:84816c00 r4:829185c0
 r4:00000000
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d20: ae9bf000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:758:5027 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:758   state:D stack:0     pid:5027  tgid:5027  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:85570c00
 r4:85570c00
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85570c00 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afb40
 r4:00000000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:855b9080
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
 r4:82abe1e4
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:759:5029 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:759   state:D stack:0     pid:5029  tgid:5029  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:85571800
 r4:85571800
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85571800 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855afe80
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85571800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e066d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85536f8c r4:85536c00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85536f8c r4:855b9100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85571800 r8:855b912c r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:855b9100 r8:8027ed34 r7:eb515e60 r6:855aa400 r5:85571800
 r4:855afa40
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:760:5030 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:760   state:D stack:0     pid:5030  tgid:5030  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
1d60: 80000013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:761:5032 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:761   state:D stack:0     pid:5032  tgid:5032  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb709d84 r8:00000002 r7:60000113 r6:eb709d8c r5:85570000
 r4:85570000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85570000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84955100
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:855b9280
9fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
1d60: 80000013 ffffffff
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:762:5034 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:762   state:D stack:0     pid:5034  tgid:5034  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb711d84 r8:00000002 r7:60000113 r6:eb711d8c r5:85573000
 r4:85573000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85573000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855affc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85573000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0777000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553738c r4:85537000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553738c r4:855b9200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85573000 r8:855b922c r7:82804d40 r6:dddced40 r5:dddced60
 r4:855b9200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b9200 r8:8027ed34 r7:eb709e60 r6:855aa580 r5:85573000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb711fb0 to 0xeb711ff8)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:855afc00
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:763:5037 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:763   state:D stack:0     pid:5037  tgid:5037  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb719d84 r8:00000002 r7:60000113 r6:eb719d8c r5:85575400
 r4:85575400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85575400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1440
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:85575400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab21000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553c38c r4:8553c000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553c38c r4:855b9300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85575400 r8:855b932c r7:82804d40 r6:dddced40 r5:dddced60
 r4:855b9300
 r10:00000000 r9:855b9300 r8:8027ed34 r7:eb709e60 r6:855aa600 r5:85575400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r4:00000000
 r5:84b1eb8c r4:84b1e800
 r4:833b4e00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:764   state:D stack:0     pid:5038  tgid:5038  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1040
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855c1080
INFO: task kworker/0:764:5038 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: afba0000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:765:5040 blocked for more than 478 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:765   state:D stack:0     pid:5040  tgid:5040  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:8556e000
 r5:8556e000 r4:829185c0
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c12c0
 r7:dddced40 r6:83018000 r5:85537f8c r4:855b9400
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
1d60: 80000013 ffffffff
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:766:5043 blocked for more than 479 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:766   state:D stack:0     pid:5043  tgid:5043  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb721d84 r8:00000002 r7:60000013 r6:eb721d8c r5:84548000
 r4:84548000
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84548000 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1780
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:84548000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead2d000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553cb8c r4:8553c800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553cb8c r4:855b9500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84548000 r8:855b952c r7:82804d40 r6:dddced40 r5:dddced60
 r4:855b9500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b9500 r8:8027ed34 r7:eb719e60 r6:855b9580 r5:84548000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb721fb0 to 0xeb721ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855c1240
INFO: task kworker/0:766:5043 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: b01bb000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8553c78c r4:8553c400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553c78c r4:855b9600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84548c00 r8:855b962c r7:82804d40 r6:dddced40 r5:dddced60
 r4:855b9600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b9600 r8:8027ed34 r7:eb721e60 r6:855b9680 r5:84548c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e1fb0 to 0xeb6e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855c1240
INFO: task kworker/0:767:5044 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: b0791000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:df911dc0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
Exception stack(0xdf911fb0 to 0xdf911ff8)
 r4:833b5d80
task:kworker/0:768   state:D stack:0     pid:5047  tgid:5047  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:855b9700
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:769:5049 blocked for more than 479 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:769   state:D stack:0     pid:5049  tgid:5049  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb731d84 r8:00000002 r7:60000013 r6:eb731d8c r5:8454a400
 r4:8454a400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8454a400 r4:829185c0
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28b30>] (schedule_preempt_disabled) from [<81a2b22c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c18c0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8454a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadc9000
 r7:dddced40 r6:83018000 r5:8553cf8c r4:855b9800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d60: 80000013 ffffffff
 r4:df911dc0
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:829185c4 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:8454b000
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1bc0
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8454b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae33000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553d78c r4:8553d400
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553d78c r4:855b9900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8454b000 r8:855b992c r7:82804d40 r6:dddced40 r5:dddced60
 r4:855b9900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b9900 r8:8027ed34 r7:eb729e60 r6:855b9980 r5:8454b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb72dfb0 to 0xeb72dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855c1740
INFO: task kworker/0:770:5051 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: b11bb000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r5:8454bc00 r4:829185c0
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c1d00
 r7:dddced40 r6:83018000 r5:8553db8c r4:855b9a00
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d20: b13d7000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
 r4:00000001
INFO: task kworker/0:772:5055 blocked for more than 479 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855c1b80
INFO: task kworker/0:772:5055 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: b189e000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b1eb8c r4:84b1e800
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:833b4e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83308000 r8:833b4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:833b4e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833b4e00 r8:8027ed34 r7:df879e60 r6:833b4e80 r5:83308000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf911fb0 to 0xdf911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:833b5d80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:773:5057 blocked for more than 479 seconds.
      Not tainted 6.16.0-rc3-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:773   state:D stack:0     pid:5057  tgid:5057  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28760>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a277d8>] (__schedule) from [<81a28760>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:8454d400
 r4:8454d400
[<81a28734>] (schedule) from [<81a28b48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<81a2af2c>] (__mutex_lock.constprop.0) from [<81a2b6f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8454d400 r8:855b9c2c r7:82804d40 r6:dddced40 r5:dddced60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855c1d40
INFO: task kworker/0:773:5057 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d20: b1a1f000 eca1b000 00000001 80239bb8 7f1d7000 00000001 82abe1c4 82abd5a0
1d40: 7f1d7000 eca1b000 8280c9b4 df911d9c df911da0 df911d70 80230af4 80239bd0
1d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4f30>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abe1e4
[<804e4cac>] (__purge_vmap_area_lazy) from [<804e52e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df911dc0 r5:df911e08
 r4:df911dc0
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491b640
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018205 r8:83308000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeeb000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:774   state:D stack:0     pid:5059  tgid:5059  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a2b6e4>] (__mutex_lock_slowpath) from [<81a2b738>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b6fc>] (mutex_lock) from [<804e516c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e5104>] (_vm_unmap_aliases) from [<804e905c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8880
 r4:00000000
[<804e8ef0>] (vfree) from [<8054ebb4>] (execmem_free+0x30/0x50 mm/execmem.c:399)
 r9:83018005 r8:8454e000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaedf000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553e38c r4:8553e000
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553e38c r4:855b9d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8454e000 r8:855b9d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:855b9d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b9d00 r8:8027ed34 r7:eb741e60 r6:855b9d80 r5:8454e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb745fb0 to 0xeb745ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:855a8cc0
INFO: task kworker/0:774:5059 is blocked on a mutex likely owned by task kworker/1:1:43.
task:kworker/1:1     state:R  running task     stack:0     pid:43    tgid:43    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a277d8>] (__schedule) from [<81a28b94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:83308000 r8:80200be4 r7:df911d54 r6:ffffffff r5:83308000
 r4:00000000
[<81a28b54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdf911d20 to 0xdf911d68)
1d60: 80000013 ffffffff
 r4:df911dc0
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855da480
[<8054eb84>] (execmem_free) from [<803c6be8>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafc5000
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6bd8>] (bpf_jit_free_exec) from [<803c6fc8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f60>] (bpf_jit_free) from [<803c8058>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8553ef8c r4:8553ec00
[<803c7f0c>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8553ef8c r4:855b9e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8454ec00 r8:855b9e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:855b9e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:855b9e00 r8:8027ed34 r7:eb741e60 r6:855b9e80 r5:8454ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb749fb0 to 0xeb749ff8)
9fa0:                                     00000000 00000000 00000000 00000000

Crashes (567):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/06/26 07:05 upstream 92ca6c498a5e 26d77996 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/21 23:48 upstream 3f75bfff44be d6cdfb8a .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/20 03:27 upstream fb4d33ab452e ed3e87f7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/19 13:53 upstream 74b4cc9b8780 ed3e87f7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/17 00:35 upstream e04c78d86a96 d1716036 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/15 16:03 upstream 8c6bc74c7f89 5f4b362d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/14 00:30 upstream 27605c8c0f69 1f72c409 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/10 21:55 upstream f09079bd04a9 5d7e17ca .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/10 03:10 upstream 19272b37aa4f 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/09 23:07 upstream 19272b37aa4f 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/09 19:55 upstream 19272b37aa4f 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/09 04:52 upstream 939f15e640f1 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/08 11:34 upstream 8630c59e9936 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/07 20:09 upstream bdc7f8c5adad 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/07 09:09 upstream c0c9379f235d 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/06 17:35 upstream e271ed52b344 3d899f2c .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/05 20:38 upstream ec7714e49479 6b6b5f21 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/03 09:36 upstream d00a83477e7a a30356b7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/03 06:30 upstream d00a83477e7a a30356b7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/02 18:26 upstream cd2e103d57e5 aaaaf5ea .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/01 20:45 upstream 7d4e49a77d99 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/01 09:28 upstream 4cb6c8af8591 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/31 07:05 upstream 8477ab143069 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/30 16:12 upstream f66bc387efbe 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/30 04:34 upstream 9d230d500b0e 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/29 16:41 upstream 90b83efa6701 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/29 04:31 upstream feacb1774bd5 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/28 01:57 upstream 914873bc7df9 874a1386 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/26 10:32 upstream 0f8c0258bf04 2d4582d0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/25 05:51 upstream b1427432d3b6 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/25 02:20 upstream b1427432d3b6 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/24 16:14 upstream 4856ebd99715 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/24 12:56 upstream 4856ebd99715 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/22 18:46 upstream d608703fcdd9 0919b50b .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/21 20:43 upstream 4a95bc121ccd 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/21 08:18 upstream b36ddb9210e6 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 17:08 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 12:42 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 07:31 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 02:40 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/19 06:48 upstream a5806cd506af f41472b0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/18 20:40 upstream 5723cc3450bc f41472b0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/18 17:14 upstream 5723cc3450bc f41472b0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/18 10:28 upstream 5723cc3450bc f41472b0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/17 05:00 upstream 3c21441eeffc f41472b0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/14 22:35 upstream 9f35e33144ae a4fa04ef .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/14 09:15 upstream 405e6c37c89e 7344edeb .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/25 00:39 upstream 28eb75e178d3 4dfba277 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/24 08:49 upstream 28eb75e178d3 4dfba277 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/12 11:02 upstream 2d5404caa8c7 75bb1b32 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/04 08:32 upstream a33ab3f94f51 f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 18:58 upstream 3e5e6c9900c3 f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 04:29 upstream 11066801dd4b f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/02 15:05 upstream c426456857fa f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/26 21:47 upstream 850925a8133c 65e8686b .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/08 16:32 upstream 87d6aab2389e 402f1df0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 17:02 upstream 8cf0b93919e1 d7906eff .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 12:53 upstream 8cf0b93919e1 d7906eff .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/29 13:37 upstream 3efc57369a0c ba29ff75 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/20 23:19 upstream baeb9a7d8b60 6f888b75 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 13:06 upstream 88fac17500f4 9d47f20a .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 11:06 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 09:52 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 06:56 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/25 16:35 upstream 780bdc1ba776 d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/05/30 14:11 upstream 4a4be1ad3a6e 34889ee3 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/05/02 10:41 upstream 0106679839f7 3ba885bc .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/04/02 19:56 upstream 026e680b0a08 f861ecca .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/27 15:06 upstream 7033999ecd7b 454571b6 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/27 06:52 upstream 7033999ecd7b 454571b6 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/25 04:41 upstream 5e74df2f8f15 0ea90952 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/05 10:51 upstream 90d35da658da 5fc53669 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/02/06 07:42 upstream 54be6c6c5ae8 6404acf9 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/29 16:08 upstream 41bccc98fb79 991a98f4 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/28 16:09 upstream 8a696a29c690 cc4a4020 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/28 11:47 upstream 8a696a29c690 cc4a4020 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/03 12:03 upstream 610a9b8f49fb fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/22 17:54 upstream 739a6c93cc75 d6cdfb8a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/13 07:09 upstream 27605c8c0f69 98683f8f .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/26 19:43 upstream 0ff41df1cb26 06877188 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/08 00:10 upstream 707df3375124 dbf35fa1 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/21 10:41 upstream 43fb83c17ba2 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/20 22:30 upstream bf9aa14fc523 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/20 19:17 upstream bf9aa14fc523 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/19 16:05 upstream 158f238aa69d 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/19 03:30 upstream 23acd177540d 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/18 07:48 upstream adc218676eef 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/17 18:27 upstream 4a5df3796467 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/17 04:07 upstream b5a24181e461 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/13 20:06 upstream f1b785f4c787 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/11 02:51 upstream a9cda7c0ffed 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/10 12:13 upstream de2f378f2b77 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/10 01:27 upstream da4373fbcf00 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/08 10:22 upstream 906bd684e4b1 179b040e .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 13:52 upstream 3e5e6c9900c3 f00eed24 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/02 12:22 upstream c426456857fa f00eed24 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/29 06:31 upstream e42b1a9a2557 66aeb999 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/20 11:21 upstream 715ca9dd687f cd6fc0a3 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/16 04:53 upstream 2f87d0916ce0 bde2d81c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/12 19:20 upstream 09f6b0c8904b 084d8178 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/11 17:36 upstream 1d227fcc7222 5e7b4bca .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 22:47 upstream 1d227fcc7222 cd942402 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 18:09 upstream d3d1556696c1 d44647df .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 07:06 upstream b983b271662b 0278d004 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/09 17:31 upstream 75b607fab38d 56fb2cb7 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 08:05 upstream 8cf0b93919e1 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/05 16:35 upstream 27cc6fdf7201 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/04 07:51 upstream 0c559323bbaa d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/03 18:26 upstream 7ec462100ef9 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/24 07:04 upstream 18ba6034468e 89298aad .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/18 12:26 upstream 2f27fce67173 c673ca06 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/06 11:09 upstream ad618736883b 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/06 10:02 upstream ad618736883b 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/05 21:28 upstream c763c4339688 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/05 06:34 upstream c7fb1692dc01 dfbe2ed4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 10:59 upstream 88fac17500f4 9d47f20a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 09:31 upstream 88fac17500f4 9d47f20a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 09:16 upstream 88fac17500f4 9d47f20a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2023/12/25 04:12 upstream 861deac3b092 fb427a07 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
* Struck through repros no longer work on HEAD.