syzbot


INFO: task hung in _vm_unmap_aliases (3)

Status: upstream: reported C repro on 2024/01/09 18:18
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+fe8f8efd070d727de971@syzkaller.appspotmail.com
First crash: 625d, last: 2d06h
Discussions (4)
Title Replies (including bot) Last reply
[syzbot] Monthly mm report (Dec 2024) 0 (1) 2024/12/05 09:04
[syzbot] Monthly mm report (Oct 2024) 0 (1) 2024/10/03 09:02
[syzbot] Monthly mm report (Sep 2024) 0 (1) 2024/09/02 08:17
[syzbot] [modules?] INFO: task hung in _vm_unmap_aliases (3) 0 (1) 2024/01/09 18:18
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in _vm_unmap_aliases kernel 1 1765d 1765d 0/29 auto-closed as invalid on 2020/11/17 05:59
linux-5.15 INFO: task hung in _vm_unmap_aliases 1 215d 215d 0/3 auto-obsoleted due to no activity on 2025/02/23 10:14
upstream INFO: task hung in _vm_unmap_aliases (2) modules 1 915d 915d 0/29 auto-obsoleted due to no activity on 2023/04/08 08:01
Last patch testing requests (10)
Created Duration User Patch Repo Result
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 1h08m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 22:39 33m retest repro upstream error
2025/04/28 18:53 33m retest repro upstream error
2025/04/28 18:53 1h08m retest repro upstream error
2025/04/28 18:53 1h48m retest repro upstream error
2025/04/28 16:59 1h39m retest repro upstream error
2025/04/28 16:22 33m retest repro upstream error

Sample crash report:
INFO: task kworker/1:0:23 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0     state:D stack:0     pid:23    tgid:23    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400
 r4:8324a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8324a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd3c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec6b3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8565978c r4:85659400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8565978c r4:830cd080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:830cd080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf879fb0 to 0xdf879ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:830cb100
INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 83344000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/1:2:723 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:2     state:D stack:0     pid:723   tgid:723   ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0049d84 r8:00000002 r7:60000113 r6:e0049d8c r5:832ebc00
 r4:832ebc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832ebc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0049e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd680
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:832ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec6cb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85659f8c r4:85659c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85659f8c r4:83b72b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832ebc00 r8:83b72bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:83b72b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:83b72b80 r8:8027ed34 r7:df96de60 r6:838de900 r5:832ebc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0049fb0 to 0xe0049ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:83b5b580
INFO: task kworker/1:2:723 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8347e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/1:1:3095 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1     state:D stack:0     pid:3095  tgid:3095  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df96dd84 r8:00000002 r7:60000013 r6:df96dd8c r5:84376c00
 r4:84376c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84376c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a737c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84376c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9c7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b0ff8c r4:84b0fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b0ff8c r4:84611c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84376c00 r8:84611c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84611c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84611c00 r8:8027ed34 r7:e0049e60 r6:84611200 r5:84376c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf96dfb0 to 0xdf96dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:843e2080
INFO: task kworker/1:1:3095 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 837a8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/0:5:3115 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:5     state:D stack:0     pid:3115  tgid:3115  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83240c00
 r4:83240c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83240c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849045c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:83240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9f1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b88b8c r4:84b88800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84b88b8c r4:846b0580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83240c00 r8:846b05ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0580 r8:8027ed34 r7:df979e60 r6:846b0500 r5:83240c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c1fb0 to 0xdf9c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32080
INFO: task kworker/0:5:3115 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 83a5d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/1:3:3117 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3     state:D stack:0     pid:3117  tgid:3117  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9d1d84 r8:00000002 r7:60000013 r6:df9d1d8c r5:8324c800
 r4:8324c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8324c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323f40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8324c800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85366f8c r4:85366c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85366f8c r4:84611e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8324c800 r8:84611e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84611e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84611e00 r8:8027ed34 r7:e0049e60 r6:846b0480 r5:8324c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d1fb0 to 0xdf9d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84612c40
INFO: task kworker/1:3:3117 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84320000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/0:6:3118 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6     state:D stack:0     pid:3118  tgid:3118  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:8324bc00
 r4:8324bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8324bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907c40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8324bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfeb9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ade78c r4:84ade400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ade78c r4:846b0400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8324bc00 r8:846b042c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0400 r8:8027ed34 r7:df9c1e60 r6:846b0380 r5:8324bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c5fb0 to 0xdf9c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a322c0
INFO: task kworker/0:6:3118 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84321000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/0:7:3119 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:7     state:D stack:0     pid:3119  tgid:3119  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8386b000
 r4:8386b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8386b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494a500
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8386b000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffef000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ade38c r4:84ade000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ade38c r4:846b0800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8386b000 r8:846b082c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0800 r8:8027ed34 r7:df9c5e60 r6:846b0880 r5:8386b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e9fb0 to 0xdf9e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a322c0
INFO: task kworker/0:7:3119 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84321000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/0:8:3122 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:8     state:D stack:0     pid:3122  tgid:3122  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:84100000
 r4:84100000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84100000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e8b80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84100000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06bd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83edd38c r4:83edd000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83edd38c r4:846b0900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84100000 r8:846b092c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0900 r8:8027ed34 r7:df9c5e60 r6:846b0980 r5:84100000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9ddfb0 to 0xdf9ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32500
INFO: task kworker/0:8:3122 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 84755000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/0:9:3123 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:9     state:D stack:0     pid:3123  tgid:3123  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:833d3000
 r4:833d3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:833d3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015180
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:833d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc37000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84adf38c r4:84adf000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84adf38c r4:846b0a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:833d3000 r8:846b0a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0a00 r8:8027ed34 r7:df9dde60 r6:846b0a80 r5:833d3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9edfb0 to 0xdf9edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32440
INFO: task kworker/0:9:3123 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 85720000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/0:10:3125 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10    state:D stack:0     pid:3125  tgid:3125  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:832fd400
 r4:832fd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832fd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9cc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85111f8c r4:85111c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85111f8c r4:846b0b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832fd400 r8:846b0b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0b00 r8:8027ed34 r7:df9dde60 r6:846b0b80 r5:832fd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f9fb0 to 0xdf9f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32640
INFO: task kworker/0:10:3125 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 857a4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:11:3127 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:11    state:D stack:0     pid:3127  tgid:3127  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:832f8c00
 r4:832f8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832f8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502ea80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df97b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513a78c r4:8513a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8513a78c r4:846b0c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832f8c00 r8:846b0c2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0c00 r8:8027ed34 r7:df9f9e60 r6:846b0c80 r5:832f8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa11fb0 to 0xdfa11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32840
INFO: task kworker/0:11:3127 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 858d2000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:12:3129 blocked for more than 450 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12    state:D stack:0     pid:3129  tgid:3129  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:83a86000
 r4:83a86000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83a86000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cb80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:83a86000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcd3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84becf8c r4:84becc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84becf8c r4:846b0d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83a86000 r8:846b0d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0d00 r8:8027ed34 r7:dfa11e60 r6:84611f80 r5:83a86000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa21fb0 to 0xdfa21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32a40
INFO: task kworker/0:12:3129 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 883a4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:13:3131 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13    state:D stack:0     pid:3131  tgid:3131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:84376000
 r4:84376000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84376000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84376000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9a3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8518478c r4:85184400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8518478c r4:846b0d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84376000 r8:846b0dac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0d80 r8:8027ed34 r7:dfa11e60 r6:84611b00 r5:84376000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa41fb0 to 0xdfa41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32c00
INFO: task kworker/0:13:3131 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 883a4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:14:3134 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14    state:D stack:0     pid:3134  tgid:3134  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:84371800
 r4:84371800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84371800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e6740
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84371800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03cb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85185b8c r4:85185800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85185b8c r4:846b0e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84371800 r8:846b0e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0e00 r8:8027ed34 r7:dfa41e60 r6:84611780 r5:84371800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa4dfb0 to 0xdfa4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32e80
INFO: task kworker/0:14:3134 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88883000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:15:3135 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15    state:D stack:0     pid:3135  tgid:3135  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:83a85400
 r4:83a85400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:83a85400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5dc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:83a85400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffc3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521338c r4:85213000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521338c r4:846b0e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:83a85400 r8:846b0eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0e80 r8:8027ed34 r7:dfa4de60 r6:84611680 r5:83a85400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa51fb0 to 0xdfa51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32e80
INFO: task kworker/0:15:3135 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88d74000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:16:3137 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16    state:D stack:0     pid:3137  tgid:3137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:832f5400
 r4:832f5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832f5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3ccc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaac1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85187f8c r4:85187c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85187f8c r4:846b0f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832f5400 r8:846b0f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0f00 r8:8027ed34 r7:dfa4de60 r6:838a0f00 r5:832f5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa65fb0 to 0xdfa65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a42000
INFO: task kworker/0:16:3137 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88dc3000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3139 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17    state:D stack:0     pid:3139  tgid:3139  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:832fc800
 r4:832fc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832fc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a41780
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8518678c r4:85186400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8518678c r4:846b0f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832fc800 r8:846b0fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0f80 r8:8027ed34 r7:dfa65e60 r6:846b0200 r5:832fc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa05fb0 to 0xdfa05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a42140
INFO: task kworker/0:17:3139 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 88e64000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3142 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18    state:D stack:0     pid:3142  tgid:3142  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:832fec00
 r4:832fec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832fec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3cdc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85186f8c r4:85186c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85186f8c r4:846b0180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832fec00 r8:846b01ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0180 r8:8027ed34 r7:dfa65e60 r6:846b0780 r5:832fec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa71fb0 to 0xdfa71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a423c0
INFO: task kworker/0:18:3142 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 89355000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3144 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19    state:D stack:0     pid:3144  tgid:3144  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:832e3000
 r4:832e3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832e3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531bf00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0537000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853aa38c r4:853aa000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:853aa38c r4:846b0280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832e3000 r8:846b02ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0280 r8:8027ed34 r7:dfa65e60 r6:846b0080 r5:832e3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa7dfb0 to 0xdfa7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a424c0
INFO: task kworker/0:19:3144 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8986c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3145 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20    state:D stack:0     pid:3145  tgid:3145  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:832e6c00
 r4:832e6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832e6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85343e00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83edfb8c r4:83edf800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83edfb8c r4:846b0000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832e6c00 r8:846b002c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846b0000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846b0000 r8:8027ed34 r7:dfa7de60 r6:830b8780 r5:832e6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa1dfb0 to 0xdfa1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a424c0
INFO: task kworker/0:20:3145 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 899e6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3149 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21    state:D stack:0     pid:3149  tgid:3149  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:840b5400
 r4:840b5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:840b5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85337f00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:840b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2ff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853c1f8c r4:853c1c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:853c1f8c r4:830b8680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:840b5400 r8:830b86ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:830b8680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830b8680 r8:8027ed34 r7:dfa7de60 r6:841d9980 r5:840b5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa95fb0 to 0xdfa95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a42880
INFO: task kworker/0:21:3149 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 89c7b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3150 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22    state:D stack:0     pid:3150  tgid:3150  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:840b3c00
 r4:840b3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:840b3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85316e40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:840b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa73000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:853c078c r4:853c0400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:853c078c r4:83c98380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:840b3c00 r8:83c983ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:83c98380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:83c98380 r8:8027ed34 r7:dfa95e60 r6:830cd400 r5:840b3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa1fb0 to 0xdfaa1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a42880
INFO: task kworker/0:22:3150 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 89f63000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:23:3153 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:23    state:D stack:0     pid:3153  tgid:3153  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:840b0c00
 r4:840b0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:840b0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4c500
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:840b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb027000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83ee4f8c r4:83ee4c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83ee4f8c r4:830cd380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:840b0c00 r8:830cd3ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:830cd380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cd380 r8:8027ed34 r7:dfa95e60 r6:830cd300 r5:840b0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa89fb0 to 0xdfa89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a42cc0
INFO: task kworker/0:23:3153 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8a20f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:4:3154 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:4     state:D stack:0     pid:3154  tgid:3154  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfacdd84 r8:00000002 r7:60000013 r6:dfacdd8c r5:840b4800
 r4:840b4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:840b4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:840b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec6bf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85659b8c r4:85659800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85659b8c r4:8410ed80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:840b4800 r8:8410edac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8410ed80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8410ed80 r8:8027ed34 r7:e0049e60 r6:830cd280 r5:840b4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfacdfb0 to 0xdfacdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a40900
INFO: task kworker/1:4:3154 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8ab75000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:24:3155 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:24    state:D stack:0     pid:3155  tgid:3155  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:840b6000
 r4:840b6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:840b6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:840b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaee3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8547bf8c r4:8547bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8547bf8c r4:843dc680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:840b6000 r8:843dc6ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:843dc680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:843dc680 r8:8027ed34 r7:dfa89e60 r6:843dc600 r5:840b6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfac1fb0 to 0xdfac1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a42d40
INFO: task kworker/0:24:3155 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b398000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:25:3156 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:25    state:D stack:0     pid:3156  tgid:3156  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:840b0000
 r4:840b0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:840b0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846542c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:840b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85500b8c r4:85500800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85500b8c r4:832a0700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:840b0000 r8:832a072c r7:82804d40 r6:dddced40 r5:dddced60
 r4:832a0700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:832a0700 r8:8027ed34 r7:dfa89e60 r6:83d23700 r5:840b0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfad9fb0 to 0xdfad9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a42d80
INFO: task kworker/0:25:3156 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b45b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:26:3160 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:26    state:D stack:0     pid:3160  tgid:3160  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:842c4800
 r4:842c4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562b500
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:842c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec401000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85684b8c r4:85684800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85684b8c r4:832a0200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c4800 r8:832a022c r7:82804d40 r6:dddced40 r5:dddced60
 r4:832a0200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:832a0200 r8:8027ed34 r7:dfad9e60 r6:846feb00 r5:842c4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaf5fb0 to 0xdfaf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f000
INFO: task kworker/0:26:3160 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b989000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:27:3161 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:27    state:D stack:0     pid:3161  tgid:3161  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb01d84 r8:00000002 r7:60000013 r6:dfb01d8c r5:842c3c00
 r4:842c3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fa4c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:842c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb553000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8550238c r4:85502000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8550238c r4:8334ad80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c3c00 r8:8334adac r7:82804d40 r6:dddced40 r5:dddced60
 r4:8334ad80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8334ad80 r8:8027ed34 r7:dfaf5e60 r6:846fe900 r5:842c3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb01fb0 to 0xdfb01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f240
INFO: task kworker/0:27:3161 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8b989000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:28:3163 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:28    state:D stack:0     pid:3163  tgid:3163  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:840b6c00
 r4:840b6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:840b6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d400
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:840b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec113000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8550338c r4:85503000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8550338c r4:8334a600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:840b6c00 r8:8334a62c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8334a600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8334a600 r8:8027ed34 r7:dfaf5e60 r6:8334ad00 r5:840b6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab5fb0 to 0xdfab5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f180
INFO: task kworker/0:28:3163 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8c470000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:29:3165 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:29    state:D stack:0     pid:3165  tgid:3165  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:832eec00
 r4:832eec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832eec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d2880
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83ee638c r4:83ee6000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83ee638c r4:846a1a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832eec00 r8:846a1a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846a1a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846a1a00 r8:8027ed34 r7:dfaf5e60 r6:846a1980 r5:832eec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb11fb0 to 0xdfb11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f280
INFO: task kworker/0:29:3165 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8c470000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:30:3167 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:30    state:D stack:0     pid:3167  tgid:3167  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:832e8c00
 r4:832e8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832e8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d2780
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83ee678c r4:83ee6400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83ee678c r4:846a1780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832e8c00 r8:846a17ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846a1780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846a1780 r8:8027ed34 r7:dfaf5e60 r6:846a1800 r5:832e8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb1dfb0 to 0xdfb1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f640
INFO: task kworker/0:30:3167 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8ce71000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:31:3170 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:31    state:D stack:0     pid:3170  tgid:3170  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb29d84 r8:00000002 r7:60000013 r6:dfb29d8c r5:832e9800
 r4:832e9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832e9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec567000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8575478c r4:85754400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8575478c r4:846a1680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832e9800 r8:846a16ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846a1680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846a1680 r8:8027ed34 r7:dfaf5e60 r6:846a1d80 r5:832e9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb29fb0 to 0xdfb29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f680
INFO: task kworker/0:31:3170 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8d818000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:32:3172 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:32    state:D stack:0     pid:3172  tgid:3172  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:832eb000
 r4:832eb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832eb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b0680
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacc9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85685b8c r4:85685800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85685b8c r4:846a1f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832eb000 r8:846a1fac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846a1f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846a1f80 r8:8027ed34 r7:dfb29e60 r6:84a5d000 r5:832eb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb35fb0 to 0xdfb35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f800
INFO: task kworker/0:32:3172 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8db6a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:33:3174 blocked for more than 451 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:33    state:D stack:0     pid:3174  tgid:3174  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfae5d84 r8:00000002 r7:60000013 r6:dfae5d8c r5:832ed400
 r4:832ed400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:832ed400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84670a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:832ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f25b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec1f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85864f8c r4:85864c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85864f8c r4:84a5d080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:832ed400 r8:84a5d0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d080 r8:8027ed34 r7:dfb29e60 r6:84a5d100 r5:832ed400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfae5fb0 to 0xdfae5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4f800
INFO: task kworker/0:33:3174 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8db6a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:34:3175 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:34    state:D stack:0     pid:3175  tgid:3175  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:84928000
 r4:84928000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84928000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dc980
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb679000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8578e78c r4:8578e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8578e78c r4:84a5d180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84928000 r8:84a5d1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d180 r8:8027ed34 r7:dfae5e60 r6:84a5d200 r5:84928000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb41fb0 to 0xdfb41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4fb80
INFO: task kworker/0:34:3175 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8df80000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:35:3179 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:35    state:D stack:0     pid:3179  tgid:3179  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:84928c00
 r4:84928c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84928c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559c7c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f153000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec93f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8576eb8c r4:8576e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8576eb8c r4:84a5d280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84928c00 r8:84a5d2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d280 r8:8027ed34 r7:dfae5e60 r6:84a5d300 r5:84928c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb4dfb0 to 0xdfb4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4fb80
INFO: task kworker/0:35:3179 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8f828000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:36:3181 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:36    state:D stack:0     pid:3181  tgid:3181  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84929800
 r4:84929800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84929800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b0980
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84929800 r7:00000000 r6:83018000 r5:00001000 r4:7f15b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae35000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:857acf8c r4:857acc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:857acf8c r4:84a5d380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84929800 r8:84a5d3ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d380 r8:8027ed34 r7:dfae5e60 r6:84a5d400 r5:84929800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb59fb0 to 0xdfb59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a4fd00
INFO: task kworker/0:36:3181 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 8fde7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:5:3183 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:5     state:D stack:0     pid:3183  tgid:3183  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:8492a400
 r4:8492a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8492a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdac0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8492a400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf0f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8565bf8c r4:8565bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8565bf8c r4:8449cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8492a400 r8:8449cc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8449cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8449cc00 r8:8027ed34 r7:e0049e60 r6:84a5d480 r5:8492a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb75fb0 to 0xdfb75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a40bc0
INFO: task kworker/1:5:3183 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90965000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:6:3185 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:6     state:D stack:0     pid:3185  tgid:3185  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:8492b000
 r4:8492b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8492b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd840
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8492b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec6e3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8565a78c r4:8565a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8565a78c r4:84a6c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8492b000 r8:84a6c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c000 r8:8027ed34 r7:dfb75e60 r6:84a5d500 r5:8492b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb69fb0 to 0xdfb69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6b000
INFO: task kworker/1:6:3185 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90a48000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:7:3187 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:7     state:D stack:0     pid:3187  tgid:3187  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:8492bc00
 r4:8492bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8492bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bda40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8492bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfacf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8565af8c r4:8565ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8565af8c r4:84a6c080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8492bc00 r8:84a6c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c080 r8:8027ed34 r7:dfb75e60 r6:84a5d600 r5:8492bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb8dfb0 to 0xdfb8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6b1c0
INFO: task kworker/1:7:3187 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90d36000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:37:3188 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:37    state:D stack:0     pid:3188  tgid:3188  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:8492c800
 r4:8492c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8492c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572dd40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8492c800 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec713000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85842b8c r4:85842800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85842b8c r4:84a5d580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8492c800 r8:84a5d5ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d580 r8:8027ed34 r7:dfae5e60 r6:84a5d680 r5:8492c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb91fb0 to 0xdfb91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a670c0
INFO: task kworker/0:37:3188 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 90e43000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:38:3190 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:38    state:D stack:0     pid:3190  tgid:3190  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb81d84 r8:00000002 r7:60000013 r6:dfb81d8c r5:8492d400
 r4:8492d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8492d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf7c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8492d400 r7:00000000 r6:83018000 r5:00001000 r4:7f239000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0389000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85842f8c r4:85842c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85842f8c r4:84a5d700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8492d400 r8:84a5d72c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d700 r8:8027ed34 r7:dfae5e60 r6:84a5d780 r5:8492d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb81fb0 to 0xdfb81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a674c0
INFO: task kworker/0:38:3190 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9131b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:39:3192 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:39    state:D stack:0     pid:3192  tgid:3192  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:8492e000
 r4:8492e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8492e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ce040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8492e000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb71000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8589778c r4:85897400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8589778c r4:84a5d800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8492e000 r8:84a5d82c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d800 r8:8027ed34 r7:dfae5e60 r6:84a5d880 r5:8492e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb9dfb0 to 0xdfb9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a67380
INFO: task kworker/0:39:3192 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 913c6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:8:3193 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:8     state:D stack:0     pid:3193  tgid:3193  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:8492ec00
 r4:8492ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8492ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdb40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8492ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8565b38c r4:8565b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8565b38c r4:84a6c100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8492ec00 r8:84a6c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c100 r8:8027ed34 r7:dfb75e60 r6:84a5d900 r5:8492ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbb5fb0 to 0xdfbb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6b4c0
INFO: task kworker/1:8:3193 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 91645000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:40:3197 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:40    state:D stack:0     pid:3197  tgid:3197  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:84820000
 r4:84820000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84820000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85732a40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84820000 r7:00000000 r6:83018000 r5:00001000 r4:7f2ed000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec925000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85968f8c r4:85968c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85968f8c r4:84a5d980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84820000 r8:84a5d9ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5d980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5d980 r8:8027ed34 r7:dfae5e60 r6:84a5da00 r5:84820000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfba9fb0 to 0xdfba9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a67740
INFO: task kworker/0:40:3197 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 91a46000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:41:3199 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:41    state:D stack:0     pid:3199  tgid:3199  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbcdd84 r8:00000002 r7:60000013 r6:dfbcdd8c r5:84820c00
 r4:84820c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84820c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d6d80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84820c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb99000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85969f8c r4:85969c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85969f8c r4:84a5da80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84820c00 r8:84a5daac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a5da80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a5da80 r8:8027ed34 r7:dfba9e60 r6:84a5db00 r5:84820c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbcdfb0 to 0xdfbcdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a678c0
INFO: task kworker/0:41:3199 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 91a46000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:9:3200 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:9     state:D stack:0     pid:3200  tgid:3200  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:84821800
 r4:84821800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84821800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdc40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84821800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab39000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8565b78c r4:8565b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8565b78c r4:84a6c180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84821800 r8:84a6c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c180 r8:8027ed34 r7:dfb75e60 r6:84a5db80 r5:84821800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbc1fb0 to 0xdfbc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6b540
INFO: task kworker/1:9:3200 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9224c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:10:3205 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:10    state:D stack:0     pid:3205  tgid:3205  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:84823c00
 r4:84823c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84823c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdd40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84823c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8565bb8c r4:8565b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8565bb8c r4:84a6c200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84823c00 r8:84a6c22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c200 r8:8027ed34 r7:dfb75e60 r6:84a5dd00 r5:84823c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbfdfb0 to 0xdfbfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6b980
INFO: task kworker/1:10:3205 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 92281000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:11:3209 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:11    state:D stack:0     pid:3209  tgid:3209  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc25d84 r8:00000002 r7:60000013 r6:dfc25d8c r5:84825400
 r4:84825400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84825400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c76c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84825400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85660b8c r4:85660800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85660b8c r4:84a6c280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84825400 r8:84a6c2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c280 r8:8027ed34 r7:dfb75e60 r6:84a5de80 r5:84825400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc25fb0 to 0xdfc25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6ba80
INFO: task kworker/1:11:3209 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 92872000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:12:3210 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:12    state:D stack:0     pid:3210  tgid:3210  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:842c0c00
 r4:842c0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdf40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:842c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb151000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8566038c r4:85660000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8566038c r4:84a6c300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c0c00 r8:84a6c32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c300 r8:8027ed34 r7:dfc25e60 r6:84a6c380 r5:842c0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbedfb0 to 0xdfbedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6ba80
INFO: task kworker/1:12:3210 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 92d53000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:13:3213 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:13    state:D stack:0     pid:3213  tgid:3213  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:842c3000
 r4:842c3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4f540
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:842c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1ef000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8566078c r4:85660400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8566078c r4:84a6c400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c3000 r8:84a6c42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c400 r8:8027ed34 r7:dfc25e60 r6:84a6c480 r5:842c3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc29fb0 to 0xdfc29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6bcc0
INFO: task kworker/1:13:3213 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9364d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:14:3216 blocked for more than 452 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:14    state:D stack:0     pid:3216  tgid:3216  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:842c1800
 r4:842c1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:842c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6b5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85660f8c r4:85660c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85660f8c r4:84a6c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c1800 r8:84a6c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c500 r8:8027ed34 r7:dfc25e60 r6:84a6c580 r5:842c1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc35fb0 to 0xdfc35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a67cc0
INFO: task kworker/1:14:3216 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 96446000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:15:3217 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:15    state:D stack:0     pid:3217  tgid:3217  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:842c6c00
 r4:842c6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:842c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb78b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8566138c r4:85661000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8566138c r4:84a6c600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c6c00 r8:84a6c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c600 r8:8027ed34 r7:dfc35e60 r6:84a6c680 r5:842c6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc41fb0 to 0xdfc41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a6b380
INFO: task kworker/1:15:3217 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9733a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:16:3219 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:16    state:D stack:0     pid:3219  tgid:3219  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:842c0000
 r4:842c0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:842c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb835000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8566178c r4:85661400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8566178c r4:84a6c700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c0000 r8:84a6c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c700 r8:8027ed34 r7:dfc41e60 r6:84a6c780 r5:842c0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc4dfb0 to 0xdfc4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a63040
INFO: task kworker/1:16:3219 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97417000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:17:3221 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:17    state:D stack:0     pid:3221  tgid:3221  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:842c6000
 r4:842c6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:842c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb853000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85661b8c r4:85661800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85661b8c r4:84a6c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c6000 r8:84a6c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c800 r8:8027ed34 r7:dfc4de60 r6:84a6c880 r5:842c6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc59fb0 to 0xdfc59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a63040
INFO: task kworker/1:17:3221 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97417000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:18:3223 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:18    state:D stack:0     pid:3223  tgid:3223  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:842c2400
 r4:842c2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:842c2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85177640
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:842c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb86d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85661f8c r4:85661c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85661f8c r4:84a6c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:842c2400 r8:84a6c92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6c900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6c900 r8:8027ed34 r7:dfc59e60 r6:84a6c980 r5:842c2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc65fb0 to 0xdfc65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a63200
INFO: task kworker/1:18:3223 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 979c9000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:154:3512 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:154   state:D stack:0     pid:3512  tgid:3512  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0031d84 r8:00000002 r7:60000113 r6:e0031d8c r5:84a96c00
 r4:84a96c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a96c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0031e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73e80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84a96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbcf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494c78c r4:8494c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494c78c r4:84b45b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a96c00 r8:84b45bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45b80 r8:8027ed34 r7:e0361e60 r6:84b45c00 r5:84a96c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0031fb0 to 0xe0031ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671980
INFO: task kworker/1:154:3512 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97c20000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:54:3522 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:54    state:D stack:0     pid:3522  tgid:3522  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03a9d84 r8:00000002 r7:60000113 r6:e03a9d8c r5:84751800
 r4:84751800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84751800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03a9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84751800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfad1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8f8c r4:84ac8c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8f8c r4:84b3cd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84751800 r8:84b3cdac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cd80 r8:8027ed34 r7:dfe15e60 r6:84b3ce00 r5:84751800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03a9fb0 to 0xe03a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473b500
INFO: task kworker/0:54:3522 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 97f48000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:55:3525 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:55    state:D stack:0     pid:3525  tgid:3525  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfe59d84 r8:00000002 r7:60000013 r6:dfe59d8c r5:84984800
 r4:84984800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84984800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe59e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84984800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb09000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac938c r4:84ac9000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac938c r4:84b3ce80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84984800 r8:84b3ceac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3ce80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3ce80 r8:8027ed34 r7:e03a9e60 r6:84b3cf00 r5:84984800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe59fb0 to 0xdfe59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3b100
INFO: task kworker/0:55:3525 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9830c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:56:3526 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:56    state:D stack:0     pid:3526  tgid:3526  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfe81d84 r8:00000002 r7:60000113 r6:dfe81d8c r5:84a9a400
 r4:84a9a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a9a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe81e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac9f8c r4:84ac9c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac9f8c r4:84b3cf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a9a400 r8:84b3cfac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cf80 r8:8027ed34 r7:dfe59e60 r6:84b45e80 r5:84a9a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe81fb0 to 0xdfe81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3b100
INFO: task kworker/0:56:3526 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98791000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:57:3528 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:57    state:D stack:0     pid:3528  tgid:3528  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfe99d84 r8:00000002 r7:60000113 r6:dfe99d8c r5:84a9b000
 r4:84a9b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a9b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe99e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b540
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb3b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac978c r4:84ac9400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac978c r4:846bc000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a9b000 r8:846bc02c r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc000 r8:8027ed34 r7:dfe81e60 r6:84b45f00 r5:84a9b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe99fb0 to 0xdfe99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3b400
INFO: task kworker/0:57:3528 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 987f6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:155:3530 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:155   state:D stack:0     pid:3530  tgid:3530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfeb1d84 r8:00000002 r7:60000013 r6:dfeb1d8c r5:84a9d400
 r4:84a9d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a9d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73d80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84a9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494c38c r4:8494c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494c38c r4:84b45f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a9d400 r8:84b45fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45f80 r8:8027ed34 r7:e0031e60 r6:84b45c80 r5:84a9d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfeb1fb0 to 0xdfeb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846ba200
INFO: task kworker/1:155:3530 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98b4e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:58:3532 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:58    state:D stack:0     pid:3532  tgid:3532  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfe71d84 r8:00000002 r7:60000113 r6:dfe71d8c r5:84828000
 r4:84828000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84828000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe71e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b6c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84828000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc85000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac9b8c r4:84ac9800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac9b8c r4:846bc080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84828000 r8:846bc0ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc080 r8:8027ed34 r7:dfe81e60 r6:846bc100 r5:84828000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe71fb0 to 0xdfe71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3b3c0
INFO: task kworker/0:58:3532 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98e93000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:59:3534 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:59    state:D stack:0     pid:3534  tgid:3534  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfea5d84 r8:00000002 r7:60000113 r6:dfea5d8c r5:84828c00
 r4:84828c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84828c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b840
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84828c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcdf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84aca78c r4:84aca400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84aca78c r4:846bc180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84828c00 r8:846bc1ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc180 r8:8027ed34 r7:dfe81e60 r6:846bc200 r5:84828c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfea5fb0 to 0xdfea5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3b680
INFO: task kworker/0:59:3534 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 98f59000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:60:3535 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:60    state:D stack:0     pid:3535  tgid:3535  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e039dd84 r8:00000002 r7:60000013 r6:e039dd8c r5:84829800
 r4:84829800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84829800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e039de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b9c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84829800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcc5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84aca38c r4:84aca000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84aca38c r4:846bc280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84829800 r8:846bc2ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc280 r8:8027ed34 r7:dfea5e60 r6:846bc300 r5:84829800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe039dfb0 to 0xe039dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3b680
INFO: task kworker/0:60:3535 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9923e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:61:3538 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:61    state:D stack:0     pid:3538  tgid:3538  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfec9d84 r8:00000002 r7:60000113 r6:dfec9d8c r5:8482a400
 r4:8482a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3be40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8482a400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe2f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84acaf8c r4:84acac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84acaf8c r4:846bc380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482a400 r8:846bc3ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc380 r8:8027ed34 r7:dfea5e60 r6:846bc400 r5:8482a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfec9fb0 to 0xdfec9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3b940
INFO: task kworker/0:61:3538 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 994f7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:62:3540 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:62    state:D stack:0     pid:3540  tgid:3540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfee1d84 r8:00000002 r7:60000113 r6:dfee1d8c r5:8482b000
 r4:8482b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfee1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3bc80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8482b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe05000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84acab8c r4:84aca800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84acab8c r4:846bc480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482b000 r8:846bc4ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc480 r8:8027ed34 r7:dfec9e60 r6:846bc500 r5:8482b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfee1fb0 to 0xdfee1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3bbc0
INFO: task kworker/0:62:3540 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 99669000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:63:3541 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:63    state:D stack:0     pid:3541  tgid:3541  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfed5d84 r8:00000002 r7:60000113 r6:dfed5d8c r5:8482c800
 r4:8482c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3bfc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe43000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84acb38c r4:84acb000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84acb38c r4:846bc580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482c800 r8:846bc5ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc580 r8:8027ed34 r7:dfec9e60 r6:846bc600 r5:8482c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfed5fb0 to 0xdfed5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3bcc0
INFO: task kworker/0:63:3541 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 99eae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:64:3544 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:64    state:D stack:0     pid:3544  tgid:3544  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfeedd84 r8:00000002 r7:60000113 r6:dfeedd8c r5:8482d400
 r4:8482d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84671fc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8482d400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe61000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84acb78c r4:84acb400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84acb78c r4:846bc680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482d400 r8:846bc6ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc680 r8:8027ed34 r7:dfed5e60 r6:846bc700 r5:8482d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfeedfb0 to 0xdfeedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a3be00
INFO: task kworker/0:64:3544 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 99eae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:65:3546 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:65    state:D stack:0     pid:3546  tgid:3546  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfef9d84 r8:00000002 r7:60000113 r6:dfef9d8c r5:8482e000
 r4:8482e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfef9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8482e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe95000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84acbb8c r4:84acb800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84acbb8c r4:846bc780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482e000 r8:846bc7ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc780 r8:8027ed34 r7:dfeede60 r6:846bc800 r5:8482e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfef9fb0 to 0xdfef9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671d00
INFO: task kworker/0:65:3546 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9a3a8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:66:3548 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:66    state:D stack:0     pid:3548  tgid:3548  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dff05d84 r8:00000002 r7:60000113 r6:dff05d8c r5:8482ec00
 r4:8482ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff05e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8482ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfef5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad438c r4:84ad4000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad438c r4:846bc880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482ec00 r8:846bc8ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc880 r8:8027ed34 r7:dfef9e60 r6:846bc900 r5:8482ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff05fb0 to 0xdff05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42080
INFO: task kworker/0:66:3548 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9a9d3000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:67:3550 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:67    state:D stack:0     pid:3550  tgid:3550  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03add84 r8:00000002 r7:60000113 r6:e03add8c r5:8482bc00
 r4:8482bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8482bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03ade08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8482bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfec5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84acbf8c r4:84acbc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84acbf8c r4:846bc980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8482bc00 r8:846bc9ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bc980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bc980 r8:8027ed34 r7:dff05e60 r6:846bca00 r5:8482bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03adfb0 to 0xe03adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42180
INFO: task kworker/0:67:3550 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9ba6c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:68:3551 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:68    state:D stack:0     pid:3551  tgid:3551  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03b5d84 r8:00000002 r7:60000113 r6:e03b5d8c r5:84780000
 r4:84780000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84780000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03b5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84780000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03c5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad4b8c r4:84ad4800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad4b8c r4:846bca80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84780000 r8:846bcaac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bca80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bca80 r8:8027ed34 r7:dff05e60 r6:846bcb00 r5:84780000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03b5fb0 to 0xe03b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42180
INFO: task kworker/0:68:3551 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9bbda000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:69:3553 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:69    state:D stack:0     pid:3553  tgid:3553  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03bdd84 r8:00000002 r7:60000113 r6:e03bdd8c r5:84781800
 r4:84781800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84781800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03bde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84781800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03b9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad478c r4:84ad4400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad478c r4:846bcb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84781800 r8:846bcbac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bcb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bcb80 r8:8027ed34 r7:e03b5e60 r6:846bcc00 r5:84781800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03bdfb0 to 0xe03bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42400
INFO: task kworker/0:69:3553 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9bc58000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:70:3556 blocked for more than 453 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:70    state:D stack:0     pid:3556  tgid:3556  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03b1d84 r8:00000002 r7:60000013 r6:e03b1d8c r5:84782400
 r4:84782400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84782400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03b1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42b80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84782400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad538c r4:84ad5000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad538c r4:846bcc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84782400 r8:846bccac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bcc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bcc80 r8:8027ed34 r7:e03b5e60 r6:846bcd00 r5:84782400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03b1fb0 to 0xe03b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42880
INFO: task kworker/0:70:3556 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c55a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:71:3559 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:71    state:D stack:0     pid:3559  tgid:3559  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03d5d84 r8:00000002 r7:60000013 r6:e03d5d8c r5:84783000
 r4:84783000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84783000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03d5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84783000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03d1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad4f8c r4:84ad4c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad4f8c r4:846bcd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84783000 r8:846bcdac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bcd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bcd80 r8:8027ed34 r7:e03b1e60 r6:846bce00 r5:84783000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03d5fb0 to 0xe03d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42780
INFO: task kworker/0:71:3559 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c561000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:72:3561 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:72    state:D stack:0     pid:3561  tgid:3561  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03e1d84 r8:00000002 r7:60000113 r6:e03e1d8c r5:84783c00
 r4:84783c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84783c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03e1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42cc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84783c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03e9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad578c r4:84ad5400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad578c r4:846bce80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84783c00 r8:846bceac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bce80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bce80 r8:8027ed34 r7:e03b1e60 r6:846bcf00 r5:84783c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03e1fb0 to 0xe03e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42940
INFO: task kworker/0:72:3561 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c7c6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:73:3563 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:73    state:D stack:0     pid:3563  tgid:3563  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03f9d84 r8:00000002 r7:60000113 r6:e03f9d8c r5:84784800
 r4:84784800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84784800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03f9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b42ec0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84784800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad5b8c r4:84ad5800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad5b8c r4:846bcf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84784800 r8:846bcfac r7:82804d40 r6:dddced40 r5:dddced60
 r4:846bcf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846bcf80 r8:8027ed34 r7:e03e1e60 r6:84a76000 r5:84784800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03f9fb0 to 0xe03f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42b40
INFO: task kworker/0:73:3563 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9c9d7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:74:3564 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:74    state:D stack:0     pid:3564  tgid:3564  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03c9d84 r8:00000002 r7:60000113 r6:e03c9d8c r5:84785400
 r4:84785400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84785400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03c9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b424c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84785400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0401000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad5f8c r4:84ad5c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad5f8c r4:84a76080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84785400 r8:84a760ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76080 r8:8027ed34 r7:e03f9e60 r6:84a76100 r5:84785400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03c9fb0 to 0xe03c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42d40
INFO: task kworker/0:74:3564 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9cd01000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:75:3566 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:75    state:D stack:0     pid:3566  tgid:3566  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0405d84 r8:00000002 r7:60000013 r6:e0405d8c r5:84786000
 r4:84786000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84786000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0405e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84786000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0419000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad678c r4:84ad6400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad678c r4:84a76180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84786000 r8:84a761ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76180 r8:8027ed34 r7:e03c9e60 r6:84a76200 r5:84786000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0405fb0 to 0xe0405ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b42f80
INFO: task kworker/0:75:3566 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9d248000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:76:3568 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:76    state:D stack:0     pid:3568  tgid:3568  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0411d84 r8:00000002 r7:60000013 r6:e0411d8c r5:84786c00
 r4:84786c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84786c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0411e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a040
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e041dd84 r8:00000002 r7:60000113 r6:e041dd8c r5:84780c00
 r4:84780c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84780c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e041de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a4c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84780c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0425000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad6b8c r4:84ad6800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad6b8c r4:84a76380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84780c00 r8:84a763ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76380 r8:8027ed34 r7:e0405e60 r6:84a76400 r5:84780c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe041dfb0 to 0xe041dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5a100
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e044dd84 r8:00000002 r7:60000113 r6:e044dd8c r5:84a9e000
 r4:84a9e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a9e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e044de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0431000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad6f8c r4:84ad6c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad6f8c r4:84a76580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a9e000 r8:84a765ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76580 r8:8027ed34 r7:e0429e60 r6:84a55000 r5:84a9e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe044dfb0 to 0xe044dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:80:3575 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:80    state:D stack:0     pid:3575  tgid:3575  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0455d84 r8:00000002 r7:60000113 r6:e0455d8c r5:84a9ec00
 r4:84a9ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a9ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ab80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0469000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad7f8c r4:84ad7c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad7f8c r4:84a76600
 r10:61c88647 r9:84a9ec00 r8:84a7662c r7:82804d40 r6:dddced40 r5:dddced60
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5a5c0
INFO: task kworker/0:80:3575 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9dbef000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:81:3577 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:81    state:D stack:0     pid:3577  tgid:3577  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0461d84 r8:00000002 r7:60000013 r6:e0461d8c r5:84a9bc00
 r4:84a9bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84a9bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5a880
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0449000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad778c r4:84ad7400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad778c r4:84a76680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a9bc00 r8:84a766ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76680 r8:8027ed34 r7:e0455e60 r6:84a55100 r5:84a9bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0461fb0 to 0xe0461ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5a840
INFO: task kworker/0:81:3577 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9e130000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:82:3580 blocked for more than 454 seconds.
task:kworker/0:82    state:D stack:0     pid:3580  tgid:3580  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5aa40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e045d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ad7b8c r4:84ad7800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ad7b8c r4:84a76700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a9c800 r8:84a7672c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76700 r8:8027ed34 r7:e0455e60 r6:84a55180 r5:84a9c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe046dfb0 to 0xe046dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5a8c0
INFO: task kworker/0:82:3580 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9e550000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
 r4:84b20000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0495e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:e04b3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84adcb8c r4:84adc800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84adcb8c r4:84a76780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b20000 r8:84a767ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76780 r8:8027ed34 r7:e0455e60 r6:84a55200 r5:84b20000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0495fb0 to 0xe0495ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5aa00
INFO: task kworker/0:83:3582 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9e8a5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:84:3583 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:84    state:D stack:0     pid:3583  tgid:3583  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e049dd84 r8:00000002 r7:60000113 r6:e049dd8c r5:84b20c00
 r4:84b20c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b20c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e049de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ad00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84b20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0475000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84adc38c r4:84adc000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84adc38c r4:84a76800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b20c00 r8:84a7682c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76800 r8:8027ed34 r7:e0495e60 r6:84a55280 r5:84b20c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe049dfb0 to 0xe049dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5aa00
INFO: task kworker/0:84:3583 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9eabc000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:85:3585 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:85    state:D stack:0     pid:3585  tgid:3585  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84b22400
 r4:84b22400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b22400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a5ae00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84b22400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04a3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84adc78c r4:84adc400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84adc78c r4:84a76880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b22400 r8:84a768ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76880 r8:8027ed34 r7:e0495e60 r6:84a55300 r5:84b22400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04adfb0 to 0xe04adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5ab00
INFO: task kworker/0:85:3585 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f091000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:86:3588 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:86    state:D stack:0     pid:3588  tgid:3588  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84a76900 r8:8027ed34 r7:e0495e60 r6:84a55380 r5:84b21800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04c1fb0 to 0xe04c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5ac00
INFO: task kworker/0:86:3588 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f091000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:e04cdd84 r8:00000002 r7:60000113 r6:e04cdd8c r5:84b23000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04cde08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84adcf8c r4:84adcc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84adcf8c r4:84a76980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b23000 r8:84a769ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76980 r8:8027ed34 r7:e04c1e60 r6:84a55400 r5:84b23000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04cdfb0 to 0xe04cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a5adc0
INFO: task kworker/0:87:3589 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f3f0000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/0:88    state:D stack:0     pid:3594  tgid:3594  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff5de08
 r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846bad40
INFO: task kworker/0:88:3594 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9f70c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:89:3595 blocked for more than 454 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:89    state:D stack:0     pid:3595  tgid:3595  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dff65d84 r8:00000002 r7:60000113 r6:dff65d8c r5:84b26000
 r4:84b26000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff65e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: 9fd51000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:e000dd84 r8:00000002 r7:60000113 r6:e000dd8c r5:84b26c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e000de08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:846cf38c r4:846cf000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76b00 r8:8027ed34 r7:dff65e60 r6:84a55580 r5:84b26c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe000dfb0 to 0xe000dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84683080
INFO: task kworker/0:90:3596 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a0a75000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r5:84b25400 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0435e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84a55600 r8:8027ed34 r7:e0031e60 r6:84a55680 r5:84b25400
 r4:84a73c80
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a10a8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:dff19d84 r8:00000002 r7:60000113 r6:dff19d8c r5:84b23c00
 r4:84b23c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b23c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff19e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a733c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbe3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494cb8c r4:8494c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494cb8c r4:84a55700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r5:80010013 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r5:8577c38c r4:8577c000
 r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:158:3604 blocked for more than 455 seconds.
 r4:84a94800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0441e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73100
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84a94800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc2b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494d38c r4:8494d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494d38c r4:84a55800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a94800 r8:84a5582c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55800 r8:8027ed34 r7:e0435e60 r6:84a55880 r5:84a94800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0441fb0 to 0xe0441ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a73400
INFO: task kworker/1:158:3604 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a15f0000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
 r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
task:kworker/1:159   state:D stack:0     pid:3605  tgid:3605  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0041d84 r8:00000002 r7:60000013 r6:e0041d8c r5:84b58000
 r4:84b58000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b58000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b58000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd47000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494db8c r4:8494d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494db8c r4:84a55900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b58000 r8:84a5592c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55900 r8:8027ed34 r7:e0441e60 r6:84a55980 r5:84b58000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0041fb0 to 0xe0041ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a73480
INFO: task kworker/1:159:3605 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a1b24000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:e0361dc0
 r4:00000000
 r5:00001000 r4:ec917000
 r5:8577c38c r4:8577c000
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:160:3607 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:160   state:D stack:0     pid:3607  tgid:3607  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0051d84 r8:00000002 r7:60000113 r6:e0051d8c r5:848a3000
 r4:848a3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:848a3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54040
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc5d000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494d78c r4:8494d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494d78c r4:84a55a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:848a3000 r8:84a55a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55a00 r8:8027ed34 r7:e0041e60 r6:84a76b80 r5:848a3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0051fb0 to 0xe0051ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a73140
INFO: task kworker/1:160:3607 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a21ed000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:91:3609 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:91    state:D stack:0     pid:3609  tgid:3609  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0391d84 r8:00000002 r7:60000113 r6:e0391d8c r5:848a4800
 r4:848a4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:848a4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0391e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165d00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:848a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab23000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83edc38c r4:83edc000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83edc38c r4:84a76c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:848a4800 r8:84a76c2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84a76c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a76c00 r8:8027ed34 r7:dff65e60 r6:84a76c80 r5:848a4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0391fb0 to 0xe0391ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846834c0
INFO: task kworker/0:91:3609 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a256a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r10:829185c4 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:848a6000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
Exception stack(0xe04f5fb0 to 0xe04f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a54100
INFO: task kworker/1:161:3612 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a3244000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:162:3614 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:162   state:D stack:0     pid:3614  tgid:3614  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0505d84 r8:00000002 r7:60000113 r6:e0505d8c r5:848a6c00
 r4:848a6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:848a6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a543c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:848a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd65000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494df8c r4:8494dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494df8c r4:84a55b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:163:3615 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:163   state:D stack:0     pid:3615  tgid:3615  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e050dd84 r8:00000002 r7:60000113 r6:e050dd8c r5:848a3c00
 r4:848a3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:848a3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a547c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494eb8c r4:8494e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494eb8c r4:84a55b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:848a3c00 r8:84a55bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55b80 r8:8027ed34 r7:e04f5e60 r6:84a76e00 r5:848a3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe050dfb0 to 0xe050dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a54300
INFO: task kworker/1:163:3615 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a4a72000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:164:3617 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:164   state:D stack:0     pid:3617  tgid:3617  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0521d84 r8:00000002 r7:60000013 r6:e0521d8c r5:848a2400
 r4:848a2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:848a2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a546c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494e78c r4:8494e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494e78c r4:84a55c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:848a2400 r8:84a55c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55c00 r8:8027ed34 r7:e050de60 r6:84a76e80 r5:848a2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0521fb0 to 0xe0521ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a54100
INFO: task kworker/1:164:3617 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:165:3619 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:165   state:D stack:0     pid:3619  tgid:3619  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:848a0c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54a40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfde1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494f38c r4:8494f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494f38c r4:84a55c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:848a0c00 r8:84a55cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55c80 r8:8027ed34 r7:e050de60 r6:84a76f00 r5:848a0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe052dfb0 to 0xe052dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a544c0
INFO: task kworker/1:165:3619 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:847d8000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dfdc7000
 r5:8494ef8c r4:8494ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494ef8c r4:84a55d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847d8000 r8:84a55d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55d00 r8:8027ed34 r7:e052de60 r6:84a76f80 r5:847d8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe053dfb0 to 0xe053dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a545c0
INFO: task kworker/1:166:3621 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a4d0d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r5:847d9800 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08
 r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:61c88647 r9:847d9800 r8:84a55dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84a54640
INFO: task kworker/1:167:3623 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a4d0d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:92:3624 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:92    state:D stack:0     pid:3624  tgid:3624  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0559d84 r8:00000002 r7:60000113 r6:e0559d8c r5:847da400
 r4:847da400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847da400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b40540
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:847da400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84addf8c r4:84addc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84addf8c r4:84b30080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847da400 r8:84b300ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b30080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b30080 r8:8027ed34 r7:e0391e60 r6:84b30100 r5:847da400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0559fb0 to 0xe0559ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84683b80
INFO: task kworker/0:92:3624 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a5252000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:168:3626 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:168   state:D stack:0     pid:3626  tgid:3626  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0561d84 r8:00000002 r7:60000113 r6:e0561d8c r5:847d8c00
 r4:847d8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847d8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54bc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdf5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494f78c r4:8494f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494f78c r4:84a55e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847d8c00 r8:84a55e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55e00 r8:8027ed34 r7:e0555e60 r6:84b30180 r5:847d8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0561fb0 to 0xe0561ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a548c0
INFO: task kworker/1:168:3626 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a5648000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
 r4:e0361dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0569e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54c00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847db000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff23000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8494fb8c r4:8494f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8494fb8c r4:84a55e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847db000 r8:84a55eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55e80 r8:8027ed34 r7:e0555e60 r6:84b30200 r5:847db000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0569fb0 to 0xe0569ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:82abf1e4
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:170   state:D stack:0     pid:3630  tgid:3630  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0571e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84683e80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a4478c r4:84a44400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a4478c r4:84a55f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847dbc00 r8:84a55f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a55f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55f00 r8:8027ed34 r7:e0555e60 r6:84b30280 r5:847dbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0571fb0 to 0xe0571ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a54ac0
INFO: task kworker/1:170:3630 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a5f3a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
 r5:80010013 r4:80239bd0
 r4:00000000
 r5:00001000 r4:ec917000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:171   state:D stack:0     pid:3632  tgid:3632  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0579e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84a55f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a55f80 r8:8027ed34 r7:e0571e60 r6:84b30300 r5:847dc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0579fb0 to 0xe0579ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a54f40
INFO: task kworker/1:171:3632 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a6373000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:172:3634 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:172   state:D stack:0     pid:3634  tgid:3634  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0581d84 r8:00000002 r7:60000113 r6:e0581d8c r5:847dd400
 r4:847dd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847dd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39380
 r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a4538c r4:84a45000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a4538c r4:84b3b000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847dd400 r8:84b3b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3b000 r8:8027ed34 r7:e0571e60 r6:84b30380 r5:847dd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0581fb0 to 0xe0581ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a54d00
INFO: task kworker/1:172:3634 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a6863000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:173:3636 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:173   state:D stack:0     pid:3636  tgid:3636  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:829185c4 r9:e0589d84 r8:00000002 r7:60000013 r6:e0589d8c r5:847de000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a44b8c r4:84a44800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a44b8c r4:84b3b080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847de000 r8:84b3b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3b080 r8:8027ed34 r7:e0581e60 r6:84b30400 r5:847de000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0589fb0 to 0xe0589ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84683340
INFO: task kworker/1:173:3636 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0591e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:dff8b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a44f8c r4:84a44c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a44f8c r4:84b3b100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:848a5400 r8:84b3b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3b100 r8:8027ed34 r7:e0581e60 r6:84b30480 r5:848a5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0591fb0 to 0xe0591ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b39080
INFO: task kworker/1:174:3638 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r5:848a1800 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e059de08
 r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:848a1800 r8:84b3b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abf1e4
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:176:3642 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:176   state:D stack:0     pid:3642  tgid:3642  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e003dd84 r8:00000002 r7:60000113 r6:e003dd8c r5:84b59800
 r4:84b59800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b59800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b59800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffa7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a4578c r4:84a45400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a4578c r4:84b3b200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b59800 r8:84b3b22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3b200 r8:8027ed34 r7:e059de60 r6:84b3b280 r5:84b59800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe003dfb0 to 0xe003dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:177:3645 blocked for more than 455 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:177   state:D stack:0     pid:3645  tgid:3645  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:84b5b000
 r4:84b5b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b5b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffbb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a45b8c r4:84a45800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a45b8c r4:84b3b300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b5b000 r8:84b3b32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
 r4:84b39280
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
 r4:84b45700
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:178:3647 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:178   state:D stack:0     pid:3647  tgid:3647  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05a1d84 r8:00000002 r7:60000013 r6:e05a1d8c r5:84b5bc00
 r4:84b5bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b5bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:80010013 r4:80239bd0
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:179:3648 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:179   state:D stack:0     pid:3648  tgid:3648  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04e9d84 r8:00000002 r7:60000013 r6:e04e9d8c r5:84b5c800
 r4:84b5c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b5c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dffdb000
 r7:ddde2d40 r6:83018200 r5:84a4638c r4:84b3b500
 r10:61c88647 r9:84b5c800 r8:84b3b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3b500 r8:8027ed34 r7:e05a1e60 r6:84b3b580 r5:84b5c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e9fb0 to 0xe04e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b395c0
INFO: task kworker/1:179:3648 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a7e30000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:e05bdd84 r8:00000002 r7:60000013 r6:e05bdd8c r5:84968c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:84b3b700
Exception stack(0xe05bdfb0 to 0xe05bdff8)
 r4:84b39700
Workqueue: events bpf_prog_free_deferred
 r4:00000000
1d60: 80010013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:182:3655 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:182   state:D stack:0     pid:3655  tgid:3655  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05c5d84 r8:00000002 r7:60000113 r6:e05c5d8c r5:8496a400
 r4:8496a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8496a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a54e80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b3b780 r8:8027ed34 r7:e05bde60 r6:84b30600 r5:8496a400
 r4:84b39b40
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:183:3656 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:183   state:D stack:0     pid:3656  tgid:3656  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05c9d84 r8:00000002 r7:60000113 r6:e05c9d8c r5:84968000
 r4:84968000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84968000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39e80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0023000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a4738c r4:84a47000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a4738c r4:84b3b800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84968000 r8:84b3b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3b800 r8:8027ed34 r7:e05c5e60 r6:84b30680 r5:84968000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05c9fb0 to 0xe05c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
 r4:84b39b40
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r5:80010013 r4:80239bd0
 r4:e0361dc0
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84b39d00
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:185:3661 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:185   state:D stack:0     pid:3661  tgid:3661  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05d5d84 r8:00000002 r7:60000113 r6:e05d5d8c r5:8496bc00
 r4:8496bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8496bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8496bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df885000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:84b8838c r4:84b88000
 r4:84b3b900
5fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80010013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:186:3662 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:186   state:D stack:0     pid:3662  tgid:3662  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05d9d84 r8:00000002 r7:60000013 r6:e05d9d8c r5:8496c800
 r4:8496c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849040c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0367000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84a47f8c r4:84a47c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84a47f8c r4:84b3b980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8496c800 r8:84b3b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3b980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3b980 r8:8027ed34 r7:e05d5e60 r6:84b30800 r5:8496c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:e0361dc0
 r4:00000000
 r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904840
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaf1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8938c r4:84b89000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8938c r4:84b3ba00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8496d400 r8:84b3ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3ba00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3ba00 r8:8027ed34 r7:e05d5e60 r6:84b30880 r5:8496d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc95fb0 to 0xdfc95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84904000
INFO: task kworker/1:187:3665 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a9aad000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r5:8577c38c r4:8577c000
 r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:188   state:D stack:0     pid:3666  tgid:3666  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:84b8878c r4:84b88400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8878c r4:84b3ba80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8496e000 r8:84b3baac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3ba80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3ba80 r8:8027ed34 r7:dfc95e60 r6:84b30900 r5:8496e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe39fb0 to 0xdfe39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84904200
INFO: task kworker/1:188:3666 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: a9d76000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:189:3668 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:189   state:D stack:0     pid:3668  tgid:3668  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfebdd84 r8:00000002 r7:60000113 r6:dfebdd8c r5:8496b000
 r4:8496b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8496b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfebde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904780
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8496b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa8d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b88f8c r4:84b88c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b88f8c r4:84b3bb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8496b000 r8:84b3bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3bb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3bb00 r8:8027ed34 r7:dfc95e60 r6:84b30980 r5:8496b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfebdfb0 to 0xdfebdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84904540
INFO: task kworker/1:189:3668 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aa1ea000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:190:3673 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:190   state:D stack:0     pid:3673  tgid:3673  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0395d84 r8:00000002 r7:60000113 r6:e0395d8c r5:84768000
 r4:84768000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84768000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0395e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904980
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84768000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8978c r4:84b89400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8978c r4:84b3bb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84768000 r8:84b3bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3bb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3bb80 r8:8027ed34 r7:dfc95e60 r6:84b30a00 r5:84768000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0395fb0 to 0xe0395ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:849046c0
INFO: task kworker/1:190:3673 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aa986000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:191:3675 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:191   state:D stack:0     pid:3675  tgid:3675  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03edd84 r8:00000002 r7:60000113 r6:e03edd8c r5:84769800
 r4:84769800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84769800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03ede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904f00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84769800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe07000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8a78c r4:84b8a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8a78c r4:84b3bc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84769800 r8:84b3bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3bc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3bc00 r8:8027ed34 r7:e0395e60 r6:84b30b00 r5:84769800
 r4:00000001
Exception stack(0xe03edfb0 to 0xe03edff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0:                                     00000000 00000000 00000000 00000000
 r4:84671280
INFO: task kworker/0:93:3676 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:93    state:D stack:0     pid:3676  tgid:3676  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:8476a400
 r4:8476a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8476a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849070c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8476a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea88d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84b30a80
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:e0361dc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:192:3677 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:192   state:D stack:0     pid:3677  tgid:3677  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04a9d84 r8:00000002 r7:60000013 r6:e04a9d8c r5:8476b000
 r4:8476b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8476b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904b40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc91000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b89b8c r4:84b89800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b89b8c r4:84b3bc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476b000 r8:84b3bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3bc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3bc80 r8:8027ed34 r7:e03ede60 r6:84b30c00 r5:8476b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04a9fb0 to 0xe04a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84904800
INFO: task kworker/1:192:3677 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aae8b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:193:3679 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:193   state:D stack:0     pid:3679  tgid:3679  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05add84 r8:00000002 r7:60000113 r6:e05add8c r5:84b5e000
 r4:84b5e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b5e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05adfb0 to 0xe05adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84904900
INFO: task kworker/1:193:3679 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: aaf41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:194:3683 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:194   state:D stack:0     pid:3683  tgid:3683  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05e1d84 r8:00000002 r7:60000013 r6:e05e1d8c r5:84768c00
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904dc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84768c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcdd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8a38c r4:84b8a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84b3be00
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:195:3684 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:195   state:D stack:0     pid:3684  tgid:3684  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05e5d84 r8:00000002 r7:60000013 r6:e05e5d8c r5:8476bc00
 r4:8476bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8476bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8476bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
 r5:00001000 r4:e03bf000
 r7:ddde2d40 r6:83018200 r5:84b8c78c r4:84b3be80
Exception stack(0xe05e5fb0 to 0xe05e5ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
1d20: ab77f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
 r4:e0361dc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:196:3685 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:196   state:D stack:0     pid:3685  tgid:3685  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05e9d84 r8:00000002 r7:60000113 r6:e05e9d8c r5:8476d400
 r4:8476d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8476d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8476d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8ab8c r4:84b8a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8ab8c r4:84b3bf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476d400 r8:84b3bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3bf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3bf00 r8:8027ed34 r7:e05e5e60 r6:84b30d80 r5:8476d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05e9fb0 to 0xe05e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84904fc0
INFO: task kworker/1:196:3685 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: abd3f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:197:3687 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:197   state:D stack:0     pid:3687  tgid:3687  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e04b9d84 r8:00000002 r7:60000013 r6:e04b9d8c r5:84b58c00
 r4:84b58c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b58c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b401c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe45000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8af8c r4:84b8ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8af8c r4:84b3bf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b58c00 r8:84b3bfac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b3bf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3bf80 r8:8027ed34 r7:e05e5e60 r6:84a52000 r5:84b58c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04b9fb0 to 0xe04b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b40000
INFO: task kworker/1:197:3687 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: abedd000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:198:3690 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:198   state:D stack:0     pid:3690  tgid:3690  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05f1d84 r8:00000002 r7:60000113 r6:e05f1d8c r5:84b5a400
 r4:84b5a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b5a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84904040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe65000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8b38c r4:84b8b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8b38c r4:84a52080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b5a400 r8:84a520ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52080 r8:8027ed34 r7:e05e5e60 r6:84a52100 r5:84b5a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f1fb0 to 0xe05f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84904400
INFO: task kworker/1:198:3690 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ac1ca000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:199:3692 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:199   state:D stack:0     pid:3692  tgid:3692  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:dfe8dd84 r8:00000002 r7:60000113 r6:dfe8dd8c r5:84b60000
 r4:84b60000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b60000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe8de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665100
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b60000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfea1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8b78c r4:84b8b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8b78c r4:84a52180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b60000 r8:84a521ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52180
 r10:00000000 r9:84a52180 r8:8027ed34 r7:e05e5e60 r6:84a52200 r5:84b60000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ac564000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:200:3693 blocked for more than 456 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:200   state:D stack:0     pid:3693  tgid:3693  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05f9d84 r8:00000002 r7:60000113 r6:e05f9d8c r5:84b60c00
 r4:84b60c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b60c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfedd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8bb8c r4:84b8b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8bb8c r4:84a52280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b60c00 r8:84a522ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52280 r8:8027ed34 r7:e05e5e60 r6:84a52300 r5:84b60c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f9fb0 to 0xe05f9ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
1d20: ac888000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:201:3696 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:201   state:D stack:0     pid:3696  tgid:3696  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e05f5d84 r8:00000002 r7:60000013 r6:e05f5d8c r5:84b61800
 r4:84b61800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b61800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b61800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e037f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8bf8c r4:84b8bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8bf8c r4:84a52380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b61800 r8:84a523ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52380 r8:8027ed34 r7:e05e5e60 r6:84a52400 r5:84b61800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f5fb0 to 0xe05f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846655c0
INFO: task kworker/1:201:3696 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d60: 80010013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:84671280
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:84a52480 r8:8027ed34 r7:e05e5e60 r6:84a52500 r5:84b62400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0601fb0 to 0xe0601ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84665400
INFO: task kworker/1:202:3698 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ad35d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xe0361fb0 to 0xe0361ff8)
 r4:84671280
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:e03ef000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8d38c r4:84b8d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8d38c r4:84a52580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b63000 r8:84a525ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52580 r8:8027ed34 r7:e05e5e60 r6:84a52600 r5:84b63000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0605fb0 to 0xe0605ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846658c0
INFO: task kworker/1:203:3700 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ae469000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:204:3702 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:204   state:D stack:0     pid:3702  tgid:3702  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0609d84 r8:00000002 r7:60000113 r6:e0609d8c r5:84b63c00
 r4:84b63c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b63c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03cd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8cb8c r4:84b8c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8cb8c r4:84a52680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b63c00 r8:84a526ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52680 r8:8027ed34 r7:e0605e60 r6:84a52700 r5:84b63c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665b40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b64800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03db000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8cf8c r4:84b8cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8cf8c r4:84a52780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b64800 r8:84a527ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52780 r8:8027ed34 r7:e0605e60 r6:84a52800 r5:84b64800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05fdfb0 to 0xe05fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84665a80
INFO: task kworker/1:205:3703 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: af971000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:206:3706 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:206   state:D stack:0     pid:3706  tgid:3706  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:84b65400
 r4:84b65400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b65400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665e00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03fd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8d78c r4:84b8d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8d78c r4:84a52880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b65400 r8:84a528ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52880 r8:8027ed34 r7:e0605e60 r6:84a52900 r5:84b65400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe060dfb0 to 0xe060dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84665ac0
INFO: task kworker/1:206:3706 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:00000000
 r4:82abf1e4
 r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b66000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e041f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8df8c r4:84b8dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8df8c r4:84a52980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b66000 r8:84a529ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52980 r8:8027ed34 r7:e060de60 r6:84a52a00 r5:84b66000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0615fb0 to 0xe0615ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84665c80
INFO: task kworker/1:207:3708 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b2d3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:208:3710 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:208   state:D stack:0     pid:3710  tgid:3710  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0611d84 r8:00000002 r7:60000113 r6:e0611d8c r5:84b66c00
 r4:84b66c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b66c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84665f80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e040b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8db8c r4:84b8d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8db8c r4:84a52a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b66c00 r8:84a52aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52a80 r8:8027ed34 r7:e0615e60 r6:84a52b00 r5:84b66c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0611fb0 to 0xe0611ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84665d80
INFO: task kworker/1:208:3710 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b2d3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:209:3712 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:209   state:D stack:0     pid:3712  tgid:3712  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:84b68000
 r4:84b68000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b68000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51180
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b68000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e042d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8e38c r4:84b8e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8e38c r4:84a52b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b68000 r8:84a52bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52b80 r8:8027ed34 r7:e0615e60 r6:84a52c00 r5:84b68000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0619fb0 to 0xe0619ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a511c0
INFO: task kworker/1:209:3712 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b2d3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:210:3714 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:210   state:D stack:0     pid:3714  tgid:3714  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0621d84 r8:00000002 r7:60000013 r6:e0621d8c r5:84b68c00
 r4:84b68c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b68c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51100
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e043b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8e78c r4:84b8e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8e78c r4:84a52c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b68c00 r8:84a52cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52c80 r8:8027ed34 r7:e0619e60 r6:84a52d00 r5:84b68c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0621fb0 to 0xe0621ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a51100
INFO: task kworker/1:210:3714 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b307a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:211:3715 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:211   state:D stack:0     pid:3715  tgid:3715  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e061dd84 r8:00000002 r7:60000113 r6:e061dd8c r5:84b6a400
 r4:84b6a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b6a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a518c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0465000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8ef8c r4:84b8ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8ef8c r4:84a52d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b6a400 r8:84a52dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52d80 r8:8027ed34 r7:e0621e60 r6:84a52e00 r5:84b6a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe061dfb0 to 0xe061dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a51340
INFO: task kworker/1:211:3715 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b36d5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:212:3717 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:212   state:D stack:0     pid:3717  tgid:3717  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:84b6b000
 r4:84b6b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b6b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51700
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e044f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8eb8c r4:84b8e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8eb8c r4:84a52e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b6b000 r8:84a52eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52e80 r8:8027ed34 r7:e061de60 r6:84a52f00 r5:84b6b000
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:84b69800 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b69800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0473000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b8f38c r4:84b8f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b8f38c r4:84a52f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b69800 r8:84a52fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a52f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a52f80 r8:8027ed34 r7:e061de60 r6:8465c000 r5:84b69800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfa0:                                     00000000 00000000 00000000 00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r5:00001000 r4:ec917000
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r10:61c88647 r9:84b6c800 r8:8465c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b410e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:215:3724 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:215   state:D stack:0     pid:3724  tgid:3724  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0635d84 r8:00000002 r7:60000013 r6:e0635d8c r5:84b6d400
 r4:84b6d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b6d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b410e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a519c0
INFO: task kworker/1:216:3725 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b4414000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:217:3728 blocked for more than 457 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51640
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04f9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9838c r4:84b98000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9838c r4:8465c380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b6ec00 r8:8465c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465c380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465c380 r8:8027ed34 r7:e0635e60 r6:8465c400 r5:84b6ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0639fb0 to 0xe0639ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a51d40
INFO: task kworker/1:217:3728 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b4ca5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:218:3730 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:218   state:D stack:0     pid:3730  tgid:3730  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0641d84 r8:00000002 r7:60000113 r6:e0641d8c r5:84b6bc00
 r4:84b6bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b6bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0531000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9878c r4:84b98400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9878c r4:8465c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b6bc00 r8:8465c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465c500 r8:8027ed34 r7:e0639e60 r6:8465c580 r5:84b6bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0641fb0 to 0xe0641ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a51e00
INFO: task kworker/1:218:3730 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b4e3e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe0361fb0 to 0xe0361ff8)
INFO: task kworker/1:219:3733 blocked for more than 457 seconds.
 r4:84b70000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b70000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0595000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b98b8c r4:84b98800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b98b8c r4:8465c600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b70000 r8:8465c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465c600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465c600 r8:8027ed34 r7:e0641e60 r6:8465c680 r5:84b70000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0645fb0 to 0xe0645ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf41c0
INFO: task kworker/1:219:3733 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r5:00001000 r4:ec917000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84671280
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4440
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e064f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b98f8c r4:84b98c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b98f8c r4:8465c700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b70c00 r8:8465c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465c700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465c700 r8:8027ed34 r7:e0645e60 r6:8465c780 r5:84b70c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0649fb0 to 0xe0649ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf4100
INFO: task kworker/1:220:3734 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:221:3736 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:221   state:D stack:0     pid:3736  tgid:3736  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0659d84 r8:00000002 r7:60000113 r6:e0659d8c r5:84b71800
 r4:84b71800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b71800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b71800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0663000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9938c r4:84b99000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9938c r4:8465c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b71800 r8:8465c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465c800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465c800 r8:8027ed34 r7:e0649e60 r6:8465c880 r5:84b71800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0659fb0 to 0xe0659ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf42c0
INFO: task kworker/1:221:3736 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b58b1000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:222:3739 blocked for more than 457 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:222   state:D stack:0     pid:3739  tgid:3739  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:84b72400
 r4:84b72400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b72400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4740
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b72400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0673000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9978c r4:84b99400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9978c r4:8465c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b72400 r8:8465c92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465c900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465c900 r8:8027ed34 r7:e0659e60 r6:8465c980 r5:84b72400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0661fb0 to 0xe0661ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf4480
INFO: task kworker/1:222:3739 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b5b2d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:223:3740 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:223   state:D stack:0     pid:3740  tgid:3740  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:84b73c00
 r4:84b73c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b73c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4ac0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0687000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b99f8c r4:84b99c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b99f8c r4:8465ca00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b73c00 r8:8465ca2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465ca00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465ca00 r8:8027ed34 r7:e0661e60 r6:8465ca80 r5:84b73c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0671fb0 to 0xe0671ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf45c0
INFO: task kworker/1:223:3740 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b5e66000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:224:3742 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:224   state:D stack:0     pid:3742  tgid:3742  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:84b74800
 r4:84b74800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b74800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4980
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e067b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b99b8c r4:84b99800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b99b8c r4:8465cb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b74800 r8:8465cb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465cb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465cb00 r8:8027ed34 r7:e0671e60 r6:8465cb80 r5:84b74800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe063dfb0 to 0xe063dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf46c0
INFO: task kworker/1:224:3742 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b5e66000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:225:3745 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:225   state:D stack:0     pid:3745  tgid:3745  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0685d84 r8:00000002 r7:60000113 r6:e0685d8c r5:84b75400
 r4:84b75400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b75400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4c00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b75400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0693000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9a38c r4:84b9a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9a38c r4:8465cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b75400 r8:8465cc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465cc00 r8:8027ed34 r7:e0671e60 r6:8465cc80 r5:84b75400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0685fb0 to 0xe0685ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf4a80
INFO: task kworker/1:225:3745 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4a80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b76000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9a78c r4:84b9a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9a78c r4:8465cd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b76000 r8:8465cd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465cd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465cd00 r8:8027ed34 r7:e0685e60 r6:8465cd80 r5:84b76000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0691fb0 to 0xe0691ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf4a80
INFO: task kworker/1:226:3746 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b6545000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
INFO: task kworker/1:227:3748 blocked for more than 458 seconds.
 r10:829185c4 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84b76c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf4f00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9ab8c r4:84b9a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9ab8c r4:8465ce00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b76c00 r8:8465ce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465ce00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465ce00 r8:8027ed34 r7:e0691e60 r6:8465ce80 r5:84b76c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe069dfb0 to 0xe069dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf4c80
INFO: task kworker/1:227:3748 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:00000000
1d60: 80010013 ffffffff
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b73000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9b38c r4:84b9b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9b38c r4:8465cf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b73000 r8:8465cf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8465cf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8465cf00 r8:8027ed34 r7:e069de60 r6:8465cf80 r5:84b73000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b1fb0 to 0xe06b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf4c80
INFO: task kworker/1:228:3749 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b69d6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:229:3752 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:229   state:D stack:0     pid:3752  tgid:3752  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:84b78000
 r4:84b78000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b78000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51d40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b78000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06bb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:8465c480
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84bf4fc0
INFO: task kworker/1:229:3752 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b6b88000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
Exception stack(0xe0361fb0 to 0xe0361ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:230   state:D stack:0     pid:3754  tgid:3754  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009300
 r5:00001000 r4:e06db000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9b78c r4:84b9b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9b78c r4:8500b080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b78c00 r8:8500b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500b080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500b080 r8:8027ed34 r7:e06b1e60 r6:8500b100 r5:84b78c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06cdfb0 to 0xe06cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85009080
INFO: task kworker/1:230:3754 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b7151000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
Exception stack(0xe0361fb0 to 0xe0361ff8)
task:kworker/1:231   state:D stack:0     pid:3757  tgid:3757  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
9fa0:                                     00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0707000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b9bf8c r4:84b9bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b9bf8c r4:8500b280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b7a400 r8:8500b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500b280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500b280 r8:8027ed34 r7:e06d9e60 r6:8500b300 r5:84b7a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06f5fb0 to 0xe06f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850092c0
INFO: task kworker/1:232:3758 is blocked on a mutex likely owned by task kworker/1:148:3501.
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r5:8577c38c r4:8577c000
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:234   state:D stack:0     pid:3762  tgid:3762  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e071de08
 r4:00000000
 r5:84ba878c r4:84ba8400
 r10:00000000 r9:8500b480 r8:8027ed34 r7:e0705e60 r6:8500b500 r5:84b7bc00
 r4:85009580
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:235:3764 blocked for more than 458 seconds.
 r10:829185c4 r9:e0721d84 r8:00000002 r7:60000013 r6:e0721d8c r5:84b7c800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:61c88647 r9:84b7c800 r8:8500b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85009700
INFO: task kworker/1:235:3764 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b8bba000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fa0:                                     00000000 00000000 00000000 00000000
Call trace: 
 r5:80010013 r4:80239bd0
 r4:00000000
 r5:00001000 r4:ec917000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:237:3768 blocked for more than 458 seconds.
 r4:84b7e000
 r5:84b7e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009d40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbd1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ba938c r4:84ba9000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84ba938c r4:8500b780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b7e000 r8:8500b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500b780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500b780 r8:8027ed34 r7:e0725e60 r6:8500b800 r5:84b7e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0729fb0 to 0xe0729ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85009a40
INFO: task kworker/1:237:3768 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:ec917000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:238   state:D stack:0     pid:3770  tgid:3770  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e072de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b7ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc1b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ba9b8c r4:84ba9800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84ba9b8c r4:8500b880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b7ec00 r8:8500b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500b880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500b880 r8:8027ed34 r7:e0729e60 r6:8500b900 r5:84b7ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe072dfb0 to 0xe072dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85009b40
INFO: task kworker/1:238:3770 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: b9c32000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:00000001
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:239:3771 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009fc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b80000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbf1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ba978c r4:84ba9400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84ba978c r4:8500b980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b80000 r8:8500b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500b980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500b980 r8:8027ed34 r7:e072de60 r6:8500ba00 r5:84b80000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0735fb0 to 0xe0735ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85009b40
INFO: task kworker/1:239:3771 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba28a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:240:3775 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:240   state:D stack:0     pid:3775  tgid:3775  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:829185c4 r9:e0731d84 r8:00000002 r7:60000113 r6:e0731d8c r5:84b80c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84baa38c r4:84baa000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84baa38c r4:8500ba80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b80c00 r8:8500baac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ba80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ba80 r8:8027ed34 r7:e072de60 r6:8500bb00 r5:84b80c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0731fb0 to 0xe0731ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f1c0
INFO: task kworker/1:240:3775 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:82abf1e4
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:241:3776 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:241   state:D stack:0     pid:3776  tgid:3776  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e073dd84 r8:00000002 r7:60000113 r6:e073dd8c r5:84b81800
 r4:84b81800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b81800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b81800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc47000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ba9f8c r4:84ba9c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84ba9f8c r4:8500bb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b81800 r8:8500bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500bb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500bb80 r8:8027ed34 r7:e0731e60 r6:8500bc00 r5:84b81800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe073dfb0 to 0xe073dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f1c0
INFO: task kworker/1:241:3776 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba54f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:242:3778 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:242   state:D stack:0     pid:3778  tgid:3778  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0749d84 r8:00000002 r7:60000113 r6:e0749d8c r5:8476ec00
 r4:8476ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8476ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f5c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8476ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84baa78c r4:84baa400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84baa78c r4:8500bc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476ec00 r8:8500bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500bc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500bc80 r8:8027ed34 r7:e0731e60 r6:84b30e00 r5:8476ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0749fb0 to 0xe0749ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f3c0
INFO: task kworker/1:242:3778 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba855000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:243:3781 blocked for more than 458 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:243   state:D stack:0     pid:3781  tgid:3781  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0755d84 r8:00000002 r7:60000013 r6:e0755d8c r5:847dec00
 r4:847dec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847dec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f700
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84baab8c r4:84baa800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84baab8c r4:8500bd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847dec00 r8:8500bd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500bd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500bd00 r8:8027ed34 r7:e0749e60 r6:84b30e80 r5:847dec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0755fb0 to 0xe0755ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f440
INFO: task kworker/1:243:3781 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ba95d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:244:3782 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:244   state:D stack:0     pid:3782  tgid:3782  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0759d84 r8:00000002 r7:60000113 r6:e0759d8c r5:8476c800
 r4:8476c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8476c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fa00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8476c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdc3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bab38c r4:84bab000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bab38c r4:8500bd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8476c800 r8:8500bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500bd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500bd80 r8:8027ed34 r7:e0755e60 r6:84b30f00 r5:8476c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0759fb0 to 0xe0759ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f440
INFO: task kworker/1:244:3782 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bad00000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:245:3783 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:245   state:D stack:0     pid:3783  tgid:3783  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0741d84 r8:00000002 r7:60000113 r6:e0741d8c r5:84b82400
 r4:84b82400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b82400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f880
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b82400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfda1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84baaf8c r4:84baac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84baaf8c r4:8500be00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b82400 r8:8500be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500be00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500be00 r8:8027ed34 r7:e0759e60 r6:8500be80 r5:84b82400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0741fb0 to 0xe0741ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f440
INFO: task kworker/1:245:3783 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: baeec000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:246:3785 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:246   state:D stack:0     pid:3785  tgid:3785  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:84b83000
 r4:84b83000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b83000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fb40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b83000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfde7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bab78c r4:84bab400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bab78c r4:8500bf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b83000 r8:8500bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500bf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500bf00 r8:8027ed34 r7:e0759e60 r6:8500bf80 r5:84b83000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0751fb0 to 0xe0751ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f680
INFO: task kworker/1:246:3785 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bba59000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:247:3788 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:247   state:D stack:0     pid:3788  tgid:3788  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e075dd84 r8:00000002 r7:60000113 r6:e075dd8c r5:84b83c00
 r4:84b83c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b83c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fec0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff2d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84babf8c r4:84babc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84babf8c r4:85025000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b83c00 r8:8502502c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025000 r8:8027ed34 r7:e0751e60 r6:85025080 r5:84b83c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe075dfb0 to 0xe075dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f9c0
INFO: task kworker/1:247:3788 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bbfa5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:248:3789 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:248   state:D stack:0     pid:3789  tgid:3789  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:84b84800
 r4:84b84800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b84800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fc80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b84800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe01000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84babb8c r4:84bab800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84babb8c r4:85025100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b84800 r8:8502512c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025100 r8:8027ed34 r7:e075de60 r6:85025180 r5:84b84800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0739fb0 to 0xe0739ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501f9c0
INFO: task kworker/1:248:3789 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bc4de000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:249:3791 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:249   state:D stack:0     pid:3791  tgid:3791  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0765d84 r8:00000002 r7:60000013 r6:e0765d8c r5:84b85400
 r4:84b85400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b85400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0765e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b49dc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b85400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff67000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb478c r4:84bb4400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb478c r4:85025200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b85400 r8:8502522c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025200 r8:8027ed34 r7:e075de60 r6:85025280 r5:84b85400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0765fb0 to 0xe0765ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501fb00
INFO: task kworker/1:249:3791 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bcc41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:250:3794 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:250   state:D stack:0     pid:3794  tgid:3794  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0769d84 r8:00000002 r7:60000013 r6:e0769d8c r5:84b86c00
 r4:84b86c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84b86c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009f80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff45000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb438c r4:84bb4000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb438c r4:85025300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b86c00 r8:8502532c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025300 r8:8027ed34 r7:e0765e60 r6:85025380 r5:84b86c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0769fb0 to 0xe0769ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b496c0
INFO: task kworker/1:250:3794 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:ec917000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664180
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84b86000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff83000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb4b8c r4:84bb4800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb4b8c r4:85025400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84b86000 r8:8502542c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025400 r8:8027ed34 r7:e0765e60 r6:85025480 r5:84b86000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe076dfb0 to 0xe076dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501ff80
INFO: task kworker/1:251:3796 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd06b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:252:3799 blocked for more than 459 seconds.
 r5:85030000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd39d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664600
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84664200
INFO: task kworker/1:253:3800 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd83a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bd9ff000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:255:3804 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:255   state:D stack:0     pid:3804  tgid:3804  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47b5d84 r8:00000002 r7:60000113 r6:e47b5d8c r5:84879800
 r4:84879800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47b5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664b40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84879800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0043000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb678c r4:84bb6400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb678c r4:85025700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84879800 r8:8502572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025700 r8:8027ed34 r7:e077de60 r6:84946080 r5:84879800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47b5fb0 to 0xe47b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84664300
INFO: task kworker/1:255:3804 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bdcc7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:256:3805 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:256   state:D stack:0     pid:3805  tgid:3805  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47b9d84 r8:00000002 r7:60000113 r6:e47b9d8c r5:8487a400
 r4:8487a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8487a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47b9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664780
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8487a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffdd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb5b8c r4:84bb5800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb5b8c r4:85025780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487a400 r8:850257ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025780 r8:8027ed34 r7:e47b5e60 r6:84946100 r5:8487a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47b9fb0 to 0xe47b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84664300
INFO: task kworker/1:256:3805 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bdfc6000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:257:3806 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:257   state:D stack:0     pid:3806  tgid:3806  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47c1d84 r8:00000002 r7:60000113 r6:e47c1d8c r5:84878c00
 r4:84878c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84878c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0003000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb5f8c r4:84bb5c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb5f8c r4:85025800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84878c00 r8:8502582c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025800 r8:8027ed34 r7:e47b5e60 r6:84946180 r5:84878c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47c1fb0 to 0xe47c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84664580
INFO: task kworker/1:257:3806 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: be485000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:258:3810 blocked for more than 459 seconds.
Call trace: 
 r5:8487bc00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47bde08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8487bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0025000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb638c r4:84bb6000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb638c r4:85025880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487bc00 r8:850258ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025880 r8:8027ed34 r7:e47b5e60 r6:84946200 r5:8487bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47bdfb0 to 0xe47bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846646c0
INFO: task kworker/1:258:3810 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: be485000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8577c38c r4:8577c000
 r4:84b45700
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r4:8487c800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
 r9:83018205 r8:8487c800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e005d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb6b8c r4:84bb6800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb6b8c r4:85025900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487c800 r8:8502592c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025900 r8:8027ed34 r7:e47b5e60 r6:84946280 r5:8487c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47c5fb0 to 0xe47c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84664880
INFO: task kworker/1:259:3813 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: be485000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b45700
Exception stack(0xe0361fb0 to 0xe0361ff8)
INFO: task kworker/1:260:3815 blocked for more than 459 seconds.
 r10:829185c4 r9:e47c9d84 r8:00000002 r7:60000013 r6:e47c9d8c r5:8487d400
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c9e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: beb58000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:261:3816 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:261   state:D stack:0     pid:3816  tgid:3816  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47cdd84 r8:00000002 r7:60000113 r6:e47cdd8c r5:8487e000
 r4:8487e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8487e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47cde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:8487e000 r8:85025a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82abf1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r5:8577c38c r4:8577c000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:262:3819 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:262   state:D stack:0     pid:3819  tgid:3819  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:85031800
 r4:85031800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85031800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85008c00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85031800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0543000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb7b8c r4:84bb7800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb7b8c r4:85025a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85031800 r8:85025aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025a80 r8:8027ed34 r7:e47c9e60 r6:85025b00 r5:85031800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0779fb0 to 0xe0779ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:84664c80
Workqueue: events bpf_prog_free_deferred
1d20: bf4e7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r5:8577c38c r4:8577c000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:263:3821 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:263   state:D stack:0     pid:3821  tgid:3821  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0775d84 r8:00000002 r7:60000113 r6:e0775d8c r5:85032400
 r4:85032400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85032400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84664a80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85032400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0523000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bb778c r4:84bb7400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84bb778c r4:85025b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85032400 r8:85025bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025b80 r8:8027ed34 r7:e0779e60 r6:85025c00 r5:85032400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0775fb0 to 0xe0775ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
1d60: 80010013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:00000000
 r5:00001000 r4:ec917000
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:264:3823 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:264   state:D stack:0     pid:3823  tgid:3823  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47d5d84 r8:00000002 r7:60000113 r6:e47d5d8c r5:85033000
 r4:85033000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85033000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47d5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f380
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85033000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0573000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2838c r4:84b28000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2838c r4:85025c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85033000 r8:85025cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025c80 r8:8027ed34 r7:e0779e60 r6:85025d00 r5:85033000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47d5fb0 to 0xe47d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850087c0
INFO: task kworker/1:264:3823 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: bf97c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:265:3824 blocked for more than 459 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:265   state:D stack:0     pid:3824  tgid:3824  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47d9d84 r8:00000002 r7:60000113 r6:e47d9d8c r5:85033c00
 r4:85033c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85033c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47d9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85033c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:85025d80
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
1d20: c0c4c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
 r4:82abf1e4
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:266:3826 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:266   state:D stack:0     pid:3826  tgid:3826  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47ddd84 r8:00000002 r7:60000113 r6:e47ddd8c r5:85034800
 r4:85034800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85034800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47dde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f4c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85034800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0583000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2878c r4:84b28400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2878c r4:85025e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85034800 r8:85025eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025e80 r8:8027ed34 r7:e47d5e60 r6:85025f00 r5:85034800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47ddfb0 to 0xe47ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3f080
INFO: task kworker/1:266:3826 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c1001000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:267:3829 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:267   state:D stack:0     pid:3829  tgid:3829  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47e1d84 r8:00000002 r7:60000013 r6:e47e1d8c r5:85035400
 r4:85035400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85035400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f600
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b28b8c r4:85025f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85035400 r8:85025fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85025f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85025f80 r8:8027ed34 r7:e47dde60 r6:84b38000 r5:85035400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47e1fb0 to 0xe47e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3f340
INFO: task kworker/1:267:3829 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c122b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:268:3830 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:268   state:D stack:0     pid:3830  tgid:3830  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47e5d84 r8:00000002 r7:60000013 r6:e47e5d8c r5:85036000
 r4:85036000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85036000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85036000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47f5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2938c r4:84b29000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2938c r4:84b38080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85036000 r8:84b380ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38080 r8:8027ed34 r7:e47e1e60 r6:84b38100 r5:85036000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47e5fb0 to 0xe47e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3f540
INFO: task kworker/1:268:3830 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c1606000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:269:3832 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:269   state:D stack:0     pid:3832  tgid:3832  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47e9d84 r8:00000002 r7:60000113 r6:e47e9d8c r5:85036c00
 r4:85036c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85036c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85036c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47a2000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b28f8c r4:84b28c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b28f8c r4:84b38180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85036c00 r8:84b381ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38180 r8:8027ed34 r7:e47e5e60 r6:84b38200 r5:85036c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47e9fb0 to 0xe47e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3f480
INFO: task kworker/1:269:3832 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c17aa000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:270:3835 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:270   state:D stack:0     pid:3835  tgid:3835  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e47edd84 r8:00000002 r7:60000113 r6:e47edd8c r5:85030c00
 r4:85030c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85030c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47ede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3fa80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85030c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8807000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2978c r4:84b29400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2978c r4:84b38280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85030c00 r8:84b382ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38280 r8:8027ed34 r7:e47e5e60 r6:84b38300 r5:85030c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47edfb0 to 0xe47edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3f700
INFO: task kworker/1:270:3835 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c1e3b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:271:3837 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:271   state:D stack:0     pid:3837  tgid:3837  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8805d84 r8:00000002 r7:60000013 r6:e8805d8c r5:85038000
 r4:85038000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85038000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8805e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3fc00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85038000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8817000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b29b8c r4:84b29800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b29b8c r4:84b38380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85038000 r8:84b383ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38380 r8:8027ed34 r7:e47ede60 r6:84b38400 r5:85038000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8805fb0 to 0xe8805ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3f880
INFO: task kworker/1:271:3837 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c30a7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:272:3839 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:272   state:D stack:0     pid:3839  tgid:3839  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8815d84 r8:00000002 r7:60000113 r6:e8815d8c r5:85038c00
 r4:85038c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85038c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8815e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3fd40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85038c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8823000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b29f8c r4:84b29c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b29f8c r4:84b38480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85038c00 r8:84b384ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38480 r8:8027ed34 r7:e8805e60 r6:84b38500 r5:85038c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8815fb0 to 0xe8815ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3fa00
INFO: task kworker/1:272:3839 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c3284000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:273:3841 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:273   state:D stack:0     pid:3841  tgid:3841  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8821d84 r8:00000002 r7:60000113 r6:e8821d8c r5:85039800
 r4:85039800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85039800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8821e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3ff00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85039800 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e882f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2a38c r4:84b2a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2a38c r4:84b38580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85039800 r8:84b385ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38580 r8:8027ed34 r7:e8815e60 r6:84b38600 r5:85039800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8821fb0 to 0xe8821ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3fbc0
INFO: task kworker/1:273:3841 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c340e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:274:3844 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:274   state:D stack:0     pid:3844  tgid:3844  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e882dd84 r8:00000002 r7:60000113 r6:e882dd8c r5:8503a400
 r4:8503a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8503a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e882de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467a300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8503a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8857000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2af8c r4:84b2ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2af8c r4:84b38680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8503a400 r8:84b386ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38680 r8:8027ed34 r7:e8821e60 r6:84b38700 r5:8503a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe882dfb0 to 0xe882dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3fd80
INFO: task kworker/1:274:3844 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c380d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:275:3845 blocked for more than 460 seconds.
 r10:829185c4 r9:e47f9d84 r8:00000002 r7:60000113 r6:e47f9d8c r5:8503b000
 r4:8503b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8503b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47f9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32140
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8503b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e883b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84b2a78c r4:84b2a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2a78c r4:84b38780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8503b000 r8:84b387ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38780 r8:8027ed34 r7:e882de60 r6:84b38800 r5:8503b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47f9fb0 to 0xe47f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b3fd80
INFO: task kworker/1:275:3845 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c4579000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:276:3847 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:276   state:D stack:0     pid:3847  tgid:3847  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8839d84 r8:00000002 r7:60000113 r6:e8839d8c r5:8503bc00
 r4:8503bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8503bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8839e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467a100
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8503bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
 r5:00001000 r4:e884b000
 r7:ddde2d40 r6:83018200 r5:84b2ab8c r4:84b38880
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8839fb0 to 0xe8839ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8467a040
INFO: task kworker/1:276:3847 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c48e4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
 r5:00001000 r4:ec917000
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
Exception stack(0xe0361fb0 to 0xe0361ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:e8855d84 r8:00000002 r7:60000113 r6:e8855d8c r5:8503c800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r5:00001000 r4:e887d000
 r5:84b2bb8c r4:84b2b800
 r10:00000000 r9:84b38980 r8:8027ed34 r7:e882de60 r6:84b38a00 r5:8503c800
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8467a180
INFO: task kworker/1:277:3849 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c4fcf000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r5:8503d400 r4:829185c0
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:84b2b38c r4:84b2b000
Exception stack(0xe8861fb0 to 0xe8861ff8)
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c4fcf000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:279:3853 blocked for more than 460 seconds.
 r10:829185c4 r9:e886dd84 r8:00000002 r7:60000113 r6:e886dd8c r5:8503e000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:e886f000
 r5:84b2b78c r4:84b2b400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:84b2b78c r4:84b38b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8503e000 r8:84b38bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38b80 r8:8027ed34 r7:e8855e60 r6:84b38c00 r5:8503e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe886dfb0 to 0xe886dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8467a480
INFO: task kworker/1:279:3853 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c5624000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:280:3855 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:280   state:D stack:0     pid:3855  tgid:3855  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8879d84 r8:00000002 r7:60000113 r6:e8879d8c r5:8503ec00
 r4:8503ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8503ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8879e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467aa80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8503ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea899000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507038c r4:85070000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507038c r4:84b38c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8503ec00 r8:84b38cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38c80 r8:8027ed34 r7:e8855e60 r6:84b38d00 r5:8503ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8879fb0 to 0xe8879ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8467a5c0
INFO: task kworker/1:280:3855 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c5a12000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:281   state:D stack:0     pid:3858  tgid:3858  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea891e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467ac00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85048000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df973000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507078c r4:85070400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507078c r4:84b38e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85048000 r8:84b38e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38e00 r8:8027ed34 r7:e8879e60 r6:84b38e80 r5:85048000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea891fb0 to 0xea891ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8467a900
INFO: task kworker/1:281:3858 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c64e0000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:282:3860 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:282   state:D stack:0     pid:3860  tgid:3860  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e03a1d84 r8:00000002 r7:60000113 r6:e03a1d8c r5:85048c00
 r4:85048c00
 r5:85048c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03a1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8467ad80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85048c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9a9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85070b8c r4:85070800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85070b8c r4:84b38f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85048c00 r8:84b38f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b38f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b38f00 r8:8027ed34 r7:ea891e60 r6:84b38f80 r5:85048c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03a1fb0 to 0xe03a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8467aa00
INFO: task kworker/1:282:3860 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c682c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:85049800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:85070f8c r4:85070c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:284:3864 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8504a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
 r5:00001000 r4:dfcb1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85071f8c r4:85071c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85071f8c r4:84a38080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8504a400 r8:84a380ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38080 r8:8027ed34 r7:e04dde60 r6:84a38100 r5:8504a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05b1fb0 to 0xe05b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8467ad00
INFO: task kworker/1:284:3864 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:285:3866 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:285   state:D stack:0     pid:3866  tgid:3866  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:8504b000
 r4:8504b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8504b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:84a38180 r8:8027ed34 r7:e05b1e60 r6:84a38200 r5:8504b000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8467ad00
Workqueue: events bpf_prog_free_deferred
 r4:00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:286:3868 blocked for more than 460 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:286   state:D stack:0     pid:3868  tgid:3868  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8849d84 r8:00000002 r7:60000013 r6:e8849d8c r5:8504c800
 r4:8504c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8504c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8849e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84a38280
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: c821e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:287:3869 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:287   state:D stack:0     pid:3869  tgid:3869  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e068dd84 r8:00000002 r7:60000113 r6:e068dd8c r5:8487ec00
 r4:8487ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8487ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849023c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8487ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc79000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85071b8c r4:85071800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85071b8c r4:84a38380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8487ec00 r8:84a383ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38380 r8:8027ed34 r7:e05b1e60 r6:84946400 r5:8487ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe068dfb0 to 0xe068dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84902100
INFO: task kworker/1:287:3869 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:8496ec00
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:289:3875 blocked for more than 461 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0681e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8504d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe6d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85072f8c r4:85072c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85072f8c r4:84a38480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8504d400 r8:84a384ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38480 r8:8027ed34 r7:e06e1e60 r6:84a38500 r5:8504d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0681fb0 to 0xe0681ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:290:3876 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:290   state:D stack:0     pid:3876  tgid:3876  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06fdd84 r8:00000002 r7:60000013 r6:e06fdd8c r5:8504e000
 r4:8504e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8504e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902700
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8504e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe11000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507278c r4:85072400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507278c r4:84a38580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8504e000 r8:84a385ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38580 r8:8027ed34 r7:e0681e60 r6:84a38600 r5:8504e000
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:291:3878 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:291   state:D stack:0     pid:3878  tgid:3878  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:8504bc00
 r4:8504bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8504bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8504bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe41000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85072b8c r4:85072800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8504bc00 r8:84a386ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:82abf1e4
 r4:00000000
 r5:00001000 r4:ec917000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:292:3880 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:292   state:D stack:0     pid:3880  tgid:3880  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8a9d84 r8:00000002 r7:60000113 r6:ea8a9d8c r5:85050000
 r4:85050000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85050000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902d40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85050000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e037d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507338c r4:85073000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507338c r4:84a38780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85050000 r8:84a387ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38780 r8:8027ed34 r7:e0681e60 r6:84a38800 r5:85050000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8a9fb0 to 0xea8a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84902800
INFO: task kworker/1:292:3880 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cae9c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
 r4:e0361dc0
 r4:00000000
 r5:00001000 r4:ec917000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:293:3883 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:293   state:D stack:0     pid:3883  tgid:3883  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8b1d84 r8:00000002 r7:60000013 r6:ea8b1d8c r5:85050c00
 r4:85050c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85050c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84902f00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85050c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03a3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507378c r4:85073400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507378c r4:84a38880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85050c00 r8:84a388ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38880 r8:8027ed34 r7:ea8a9e60 r6:84a38900 r5:85050c00
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xe0361d20 to 0xe0361d68)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r5:8577c38c r4:8577c000
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:294:3884 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:294   state:D stack:0     pid:3884  tgid:3884  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8b5d84 r8:00000002 r7:60000113 r6:ea8b5d8c r5:85053000
 r4:85053000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85053000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850020c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85053000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03c3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84a38980
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:94:3885 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:94    state:D stack:0     pid:3885  tgid:3885  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8b9d84 r8:00000002 r7:60000113 r6:ea8b9d8c r5:85053c00
 r4:85053c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85053c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018005 r8:85053c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
 r10:61c88647 r9:85053c00 r8:8494652c r7:82804d40 r6:dddced40 r5:dddced60
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe0361fb0 to 0xe0361ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:295   state:D stack:0     pid:3887  tgid:3887  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8bdd84 r8:00000002 r7:60000113 r6:ea8bdd8c r5:85051800
 r4:85051800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85051800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8bde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002740
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85051800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0407000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507838c r4:85078000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507838c r4:84a38b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85051800 r8:84a38b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38b00 r8:8027ed34 r7:ea8b5e60 r6:84a38b80 r5:85051800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8bdfb0 to 0xea8bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84902940
INFO: task kworker/1:295:3887 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cbe03000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:296:3889 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:296   state:D stack:0     pid:3889  tgid:3889  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r4:85055400
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:85073f8c r4:85073c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85002140
INFO: task kworker/1:296:3889 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cbe03000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:95    state:D stack:0     pid:3891  tgid:3891  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xea8c9fb0 to 0xea8c9ff8)
 r4:84907c00
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cc2c4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:297:3893 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:297   state:D stack:0     pid:3893  tgid:3893  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8cdd84 r8:00000002 r7:60000113 r6:ea8cdd8c r5:85056c00
 r4:85056c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85056c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8cde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850028c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85056c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0417000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507878c r4:85078400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507878c r4:84a38d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85056c00 r8:84a38dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a38d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a38d80 r8:8027ed34 r7:ea8bde60 r6:84a38e00 r5:85056c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8cdfb0 to 0xea8cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850025c0
INFO: task kworker/1:297:3893 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cc622000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:298   state:D stack:0     pid:3896  tgid:3896  ppid:2      task_flags:0x4208060 flags:0x00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:300:3900 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:300   state:D stack:0     pid:3900  tgid:3900  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8add84 r8:00000002 r7:60000113 r6:ea8add8c r5:8504ec00
 r4:8504ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8504ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ade08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002cc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0463000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507938c r4:85079000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507938c r4:84bf5080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8504ec00 r8:84bf50ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5080 r8:8027ed34 r7:ea8a5e60 r6:84bf5100 r5:8504ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8adfb0 to 0xea8adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85002940
INFO: task kworker/1:300:3900 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cd382000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:301:3903 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:301   state:D stack:0     pid:3903  tgid:3903  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8d1d84 r8:00000002 r7:60000013 r6:ea8d1d8c r5:85058000
 r4:85058000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85058000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002e40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0477000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507978c r4:85079400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507978c r4:84bf5180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85058000 r8:84bf51ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5180 r8:8027ed34 r7:ea8ade60 r6:84bf5200 r5:85058000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d1fb0 to 0xea8d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850029c0
INFO: task kworker/1:301:3903 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cd836000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:302:3904 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:302   state:D stack:0     pid:3904  tgid:3904  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8ddd84 r8:00000002 r7:60000013 r6:ea8ddd8c r5:849b9800
 r4:849b9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8dde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002fc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e049f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85079b8c r4:85079800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85079b8c r4:84bf5280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b9800 r8:84bf52ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5280 r8:8027ed34 r7:ea8d1e60 r6:84946600 r5:849b9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8ddfb0 to 0xea8ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850029c0
INFO: task kworker/1:302:3904 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cdbae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:303:3906 blocked for more than 461 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:303   state:D stack:0     pid:3906  tgid:3906  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8d5d84 r8:00000002 r7:60000113 r6:ea8d5d8c r5:85059800
 r4:85059800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85059800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d3c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85059800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0549000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507a38c r4:8507a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507a38c r4:84bf5300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85059800 r8:84bf532c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5300 r8:8027ed34 r7:ea8dde60 r6:84bf5380 r5:85059800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d5fb0 to 0xea8d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85002dc0
INFO: task kworker/1:303:3906 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cdbae000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:96:3908 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:96    state:D stack:0     pid:3908  tgid:3908  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8e1d84 r8:00000002 r7:60000113 r6:ea8e1d8c r5:85058c00
 r4:85058c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85058c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32680
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:85058c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd89000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84adf78c r4:84adf400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84adf78c r4:84946680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85058c00 r8:849466ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84946680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84946680 r8:8027ed34 r7:e0391e60 r6:84bf5400 r5:85058c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8e1fb0 to 0xea8e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84907a40
INFO: task kworker/0:96:3908 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cdee8000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:304   state:D stack:0     pid:3910  tgid:3910  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8e5d84 r8:00000002 r7:60000113 r6:ea8e5d8c r5:8505b000
 r4:8505b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8505b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8505b000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e050f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85079f8c r4:85079c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85079f8c r4:84bf5480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8505b000 r8:84bf54ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5480 r8:8027ed34 r7:ea8d5e60 r6:84bf5500 r5:8505b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8e5fb0 to 0xea8e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501d0c0
INFO: task kworker/1:304:3910 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ce23e000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:305:3911 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:305   state:D stack:0     pid:3911  tgid:3911  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8d9d84 r8:00000002 r7:60000113 r6:ea8d9d8c r5:8505bc00
 r4:8505bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8505bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d540
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8505bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05cd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507a78c r4:8507a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507a78c r4:84bf5580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8505bc00 r8:84bf55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5580 r8:8027ed34 r7:ea8d5e60 r6:84bf5600 r5:8505bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d9fb0 to 0xea8d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501d300
INFO: task kworker/1:305:3911 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ce3b7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:306:3914 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:306   state:D stack:0     pid:3914  tgid:3914  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8e9d84 r8:00000002 r7:60000013 r6:ea8e9d8c r5:8505c800
 r4:8505c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8505c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d680
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8505c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05ed000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507ab8c r4:8507a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507ab8c r4:84bf5680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8505c800 r8:84bf56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5680 r8:8027ed34 r7:ea8d9e60 r6:84bf5700 r5:8505c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8e9fb0 to 0xea8e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501d340
INFO: task kworker/1:306:3914 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: ce6d4000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r5:00001000 r4:ec917000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:307:3917 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:307   state:D stack:0     pid:3917  tgid:3917  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8edd84 r8:00000002 r7:60000013 r6:ea8edd8c r5:8505d400
 r4:8505d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8505d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8505d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e065b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507af8c r4:8507ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507af8c r4:84bf5780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8505d400 r8:84bf57ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5780 r8:8027ed34 r7:ea8e9e60 r6:84bf5800 r5:8505d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8edfb0 to 0xea8edff8)
dfa0:                                     00000000 00000000 00000000 00000000
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:308:3918 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d9c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8505e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0677000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507b38c r4:8507b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507b38c r4:84bf5880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8505e000 r8:84bf58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5880 r8:8027ed34 r7:ea8ede60 r6:84bf5900 r5:8505e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8f1fb0 to 0xea8f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501d500
INFO: task kworker/1:308:3918 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cee77000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f5e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84bf5980
5fa0:                                     00000000 00000000 00000000 00000000
 r4:8501d840
INFO: task kworker/1:309:3920 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cefac000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:310:3922 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:310   state:D stack:0     pid:3922  tgid:3922  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8f9d84 r8:00000002 r7:60000113 r6:ea8f9d8c r5:8505a400
 r4:8505a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8505a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501dcc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8505a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06a9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507bb8c r4:8507b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507bb8c r4:84bf5a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8505a400 r8:84bf5aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5a80 r8:8027ed34 r7:ea8f5e60 r6:84bf5b00 r5:8505a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8f9fb0 to 0xea8f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501d940
INFO: task kworker/1:310:3922 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cf8bc000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:311:3924 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:311   state:D stack:0     pid:3924  tgid:3924  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea8fdd84 r8:00000002 r7:60000013 r6:ea8fdd8c r5:85060000
 r4:85060000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85060000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8fde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501de00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85060000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06c3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8507bf8c r4:8507bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8507bf8c r4:84bf5b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85060000 r8:84bf5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5b80 r8:8027ed34 r7:ea8f9e60 r6:84bf5c00 r5:85060000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8fdfb0 to 0xea8fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501d940
INFO: task kworker/1:311:3924 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cf8bd000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:312:3926 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:312   state:D stack:0     pid:3926  tgid:3926  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:85060c00
 r4:85060c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85060c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501df80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85060c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06f9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508438c r4:85084000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508438c r4:84bf5c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85060c00 r8:84bf5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5c80 r8:8027ed34 r7:ea8fde60 r6:84bf5d00 r5:85060c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea909fb0 to 0xea909ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501dc80
INFO: task kworker/1:312:3926 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: cfa23000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r5:00001000 r4:ea8a1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508478c r4:85084400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508478c r4:84bf5d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85061800 r8:84bf5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5d80 r8:8027ed34 r7:ea909e60 r6:84bf5e00 r5:85061800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea911fb0 to 0xea911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8501dd80
INFO: task kworker/1:313:3928 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d0398000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:314:3930 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:314   state:D stack:0     pid:3930  tgid:3930  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea915d84 r8:00000002 r7:60000113 r6:ea915d8c r5:85062400
 r4:85062400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85062400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026500
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85062400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea935000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508538c r4:85085000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508538c r4:84bf5e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85062400 r8:84bf5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5e80 r8:8027ed34 r7:ea911e60 r6:84bf5f00 r5:85062400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea915fb0 to 0xea915ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026080
INFO: task kworker/1:314:3930 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d058a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:315:3932 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:315   state:D stack:0     pid:3932  tgid:3932  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea91dd84 r8:00000002 r7:60000013 r6:ea91dd8c r5:85063000
 r4:85063000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85063000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85063000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea919000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85084b8c r4:85084800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85084b8c r4:84bf5f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85063000 r8:84bf5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84bf5f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84bf5f80 r8:8027ed34 r7:ea915e60 r6:84672000 r5:85063000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea91dfb0 to 0xea91dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026240
INFO: task kworker/1:315:3932 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d058a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:316:3934 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:316   state:D stack:0     pid:3934  tgid:3934  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea92dd84 r8:00000002 r7:60000113 r6:ea92dd8c r5:85063c00
 r4:85063c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85063c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea92de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85063c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea925000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85084f8c r4:85084c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85084f8c r4:84672080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85063c00 r8:846720ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672080 r8:8027ed34 r7:ea915e60 r6:84672100 r5:85063c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea92dfb0 to 0xea92dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026180
INFO: task kworker/1:316:3934 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d0cbd000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:317:3936 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:317   state:D stack:0     pid:3936  tgid:3936  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea939d84 r8:00000002 r7:60000113 r6:ea939d8c r5:85064800
 r4:85064800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85064800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85064800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea961000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85085f8c r4:85085c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85085f8c r4:84672180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85064800 r8:846721ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672180 r8:8027ed34 r7:ea915e60 r6:84672200 r5:85064800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea939fb0 to 0xea939ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026380
INFO: task kworker/1:317:3936 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d0f57000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:318:3937 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:318   state:D stack:0     pid:3937  tgid:3937  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea949d84 r8:00000002 r7:60000113 r6:ea949d8c r5:849bbc00
 r4:849bbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849bbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850266c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea941000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508578c r4:85085400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508578c r4:84672280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849bbc00 r8:846722ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672280 r8:8027ed34 r7:ea939e60 r6:84946700 r5:849bbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea949fb0 to 0xea949ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026380
INFO: task kworker/1:318:3937 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d12db000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:319:3939 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:319   state:D stack:0     pid:3939  tgid:3939  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea959d84 r8:00000002 r7:60000113 r6:ea959d8c r5:849bc800
 r4:849bc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849bc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea951000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85085b8c r4:85085800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85085b8c r4:84672300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849bc800 r8:8467232c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672300 r8:8027ed34 r7:ea939e60 r6:84946780 r5:849bc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea959fb0 to 0xea959ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026540
INFO: task kworker/1:319:3939 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d15a1000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:320:3942 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:320   state:D stack:0     pid:3942  tgid:3942  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:849bd400
 r4:849bd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849bd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026d40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea98d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85086b8c r4:85086800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85086b8c r4:84672380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849bd400 r8:846723ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672380 r8:8027ed34 r7:ea939e60 r6:84946800 r5:849bd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea97dfb0 to 0xea97dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026700
INFO: task kworker/1:320:3942 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d18a7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:321:3943 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:321   state:D stack:0     pid:3943  tgid:3943  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea981d84 r8:00000002 r7:60000013 r6:ea981d8c r5:849be000
 r4:849be000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849be000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026a40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea96d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508638c r4:85086000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508638c r4:84672400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849be000 r8:8467242c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672400 r8:8027ed34 r7:ea97de60 r6:84946880 r5:849be000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea981fb0 to 0xea981ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026700
INFO: task kworker/1:321:3943 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d1a69000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:322:3946 blocked for more than 462 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:322   state:D stack:0     pid:3946  tgid:3946  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:849bb000
 r4:849bb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849bb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026bc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea979000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508678c r4:85086400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508678c r4:84672480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849bb000 r8:846724ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672480 r8:8027ed34 r7:ea97de60 r6:84946900 r5:849bb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea995fb0 to 0xea995ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850268c0
INFO: task kworker/1:322:3946 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3413000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:323:3948 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:323   state:D stack:0     pid:3948  tgid:3948  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:849ba400
 r4:849ba400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849ba400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85026ec0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9a1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85086f8c r4:85086c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85086f8c r4:84672500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849ba400 r8:8467252c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672500 r8:8027ed34 r7:ea97de60 r6:84946980 r5:849ba400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a5fb0 to 0xea9a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026b40
INFO: task kworker/1:323:3948 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d375b000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:324:3949 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:324   state:D stack:0     pid:3949  tgid:3949  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9a9d84 r8:00000002 r7:60000113 r6:ea9a9d8c r5:849bec00
 r4:849bec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849bec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb95000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85087b8c r4:85087800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85087b8c r4:84672580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849bec00 r8:846725ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672580 r8:8027ed34 r7:ea9a5e60 r6:84946a00 r5:849bec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a9fb0 to 0xea9a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026b40
INFO: task kworker/1:324:3949 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3a2d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:325:3951 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:325   state:D stack:0     pid:3951  tgid:3951  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e880dd84 r8:00000002 r7:60000013 r6:e880dd8c r5:849b8c00
 r4:849b8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e880de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850268c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9b1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508738c r4:85087000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508738c r4:84672600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b8c00 r8:8467262c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672600 r8:8027ed34 r7:ea9a9e60 r6:84946a80 r5:849b8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe880dfb0 to 0xe880dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026cc0
INFO: task kworker/1:325:3951 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3c9c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:326:3953 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:326   state:D stack:0     pid:3953  tgid:3953  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8829d84 r8:00000002 r7:60000113 r6:e8829d8c r5:849b8000
 r4:849b8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849b8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8829e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84907280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb61000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508778c r4:85087400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508778c r4:84672680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849b8000 r8:846726ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672680 r8:8027ed34 r7:ea9a9e60 r6:84946b00 r5:849b8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8829fb0 to 0xe8829ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026e80
INFO: task kworker/1:326:3953 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d3d90000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:327:3955 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:327   state:D stack:0     pid:3955  tgid:3955  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8841d84 r8:00000002 r7:60000013 r6:e8841d8c r5:847f0000
 r4:847f0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8841e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbc3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85087f8c r4:85087c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85087f8c r4:84672700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f0000 r8:8467272c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672700 r8:8027ed34 r7:ea9a9e60 r6:84946b80 r5:847f0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8841fb0 to 0xe8841ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85026f00
INFO: task kworker/1:327:3955 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d449f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:328:3958 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:328   state:D stack:0     pid:3958  tgid:3958  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8851d84 r8:00000002 r7:60000113 r6:e8851d8c r5:847f0c00
 r4:847f0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8851e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc69000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508c78c r4:8508c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508c78c r4:84672780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f0c00 r8:846727ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672780 r8:8027ed34 r7:e8841e60 r6:84946c00 r5:847f0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8851fb0 to 0xe8851ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8500d200
INFO: task kworker/1:328:3958 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d4a62000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:329:3959 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:329   state:D stack:0     pid:3959  tgid:3959  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e885dd84 r8:00000002 r7:60000113 r6:e885dd8c r5:847f1800
 r4:847f1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e885de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508c38c r4:8508c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508c38c r4:84672800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f1800 r8:8467282c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672800 r8:8027ed34 r7:e8851e60 r6:84946c80 r5:847f1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe885dfb0 to 0xe885dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8500d200
INFO: task kworker/1:329:3959 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d4ce5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:330:3963 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:330   state:D stack:0     pid:3963  tgid:3963  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8875d84 r8:00000002 r7:60000113 r6:e8875d8c r5:847f3c00
 r4:847f3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8875e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500dc80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff69000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508d78c r4:8508d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508d78c r4:84672880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f3c00 r8:846728ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672880 r8:8027ed34 r7:e8851e60 r6:84946d00 r5:847f3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8875fb0 to 0xe8875ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8500d380
INFO: task kworker/1:330:3963 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d4ebb000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:331:3964 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:331   state:D stack:0     pid:3964  tgid:3964  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9b9d84 r8:00000002 r7:60000013 r6:ea9b9d8c r5:847f2400
 r4:847f2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d700
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd67000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508cb8c r4:8508c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508cb8c r4:84672900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f2400 r8:8467292c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672900 r8:8027ed34 r7:e8875e60 r6:84946d80 r5:847f2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9b9fb0 to 0xea9b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8500d380
INFO: task kworker/1:331:3964 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d521c000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:332:3967 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:332   state:D stack:0     pid:3967  tgid:3967  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e8835d84 r8:00000002 r7:60000113 r6:e8835d8c r5:847f4800
 r4:847f4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8835e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500d900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdc1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508cf8c r4:8508cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508cf8c r4:84672980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f4800 r8:846729ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672980 r8:8027ed34 r7:e8875e60 r6:84946e00 r5:847f4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8835fb0 to 0xe8835ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8500d640
INFO: task kworker/1:332:3967 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d54aa000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:97:3968 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:97    state:D stack:0     pid:3968  tgid:3968  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:847f5400
 r4:847f5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8465a300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:847f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfde9000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84adfb8c r4:84adf800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84adfb8c r4:84946e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f5400 r8:84946eac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84946e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84946e80 r8:8027ed34 r7:e0391e60 r6:84946f00 r5:847f5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9bdfb0 to 0xea9bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32600
INFO: task kworker/0:97:3968 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d58c5000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:333:3970 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:333   state:D stack:0     pid:3970  tgid:3970  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9c1d84 r8:00000002 r7:60000013 r6:ea9c1d8c r5:847f6000
 r4:847f6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500dac0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff25000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508d38c r4:8508d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508d38c r4:84672a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f6000 r8:84672a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672a00 r8:8027ed34 r7:e8875e60 r6:84946f80 r5:847f6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9c1fb0 to 0xea9c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8500d600
INFO: task kworker/1:333:3970 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d5ada000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:847f6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8869e08
 r4:00000000
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d5ada000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea955d84 r8:00000002 r7:60000113 r6:ea955d8c r5:847f3000
 r4:847f3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8465a7c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:847f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff8f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83edcf8c r4:83edcc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83edcf8c r4:85007000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f3000 r8:8500702c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85007000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85007000 r8:8027ed34 r7:e0391e60 r6:85007080 r5:847f3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea955fb0 to 0xea955ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8465a280
INFO: task kworker/0:99:3975 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d614d000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:84930000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500dd80
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffb3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508db8c r4:8508d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508db8c r4:84672a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84930000 r8:84672aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84672a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672a80 r8:8027ed34 r7:e8875e60 r6:85007100 r5:84930000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9cdfb0 to 0xea9cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8500db00
INFO: task kworker/1:334:3977 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d63d1000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:100:3980 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:100   state:D stack:0     pid:3980  tgid:3980  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:84932400
 r4:84932400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84932400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85153600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84932400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea901000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83edcb8c r4:83edc800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83edcb8c r4:85007180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84932400 r8:850071ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85007180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85007180 r8:8027ed34 r7:e0391e60 r6:85007200 r5:84932400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9d5fb0 to 0xea9d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8465a740
INFO: task kworker/0:100:3980 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d6761000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d60: 80010013 ffffffff
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:335:3981 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:335   state:D stack:0     pid:3981  tgid:3981  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9d9d84 r8:00000002 r7:60000113 r6:ea9d9d8c r5:84933000
 r4:84933000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84933000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84672b00 r8:8027ed34 r7:ea9cde60 r6:85007280 r5:84933000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xe0361d20 to 0xe0361d68)
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:84671280
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:00000000
 r4:82abf1e4
 r4:00000000
 r5:8577c38c r4:8577c000
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:337:3985 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:337   state:D stack:0     pid:3985  tgid:3985  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:85065400
 r4:85065400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85065400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002100
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85065400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0001000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8577c38c r4:8577c000
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:338:3986 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:338   state:D stack:0     pid:3986  tgid:3986  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9c9d84 r8:00000002 r7:60000113 r6:ea9c9d8c r5:85066000
 r4:85066000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85066000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84149ac0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85066000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e002b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508eb8c r4:8508e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85066000 r8:84672dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
1d60: 80010013 ffffffff
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:339:3989 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:339   state:D stack:0     pid:3989  tgid:3989  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9e1d84 r8:00000002 r7:60000013 r6:ea9e1d8c r5:8476e000
 r4:8476e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:8476e000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:340:3991 blocked for more than 463 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:340   state:D stack:0     pid:3991  tgid:3991  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9e9d84 r8:00000002 r7:60000013 r6:ea9e9d8c r5:840b1800
 r4:840b1800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c140
 r5:00001000 r4:e0057000
 r7:ddde2d40 r6:83018200 r5:8508ef8c r4:84672f80
 r4:84672f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84672f80 r8:8027ed34 r7:ea9e1e60 r6:8509f000 r5:840b1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e9fb0 to 0xea9e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c080
INFO: task kworker/1:340:3991 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d85e9000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:341:3993 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c440
 r7:ddde2d40 r6:83018200 r5:8508f78c r4:8509f080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84bf8000 r8:8509f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509f080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509f080 r8:8027ed34 r7:ea9e1e60 r6:8509f100 r5:84bf8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9edfb0 to 0xea9edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c180
INFO: task kworker/1:341:3993 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d9638000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:342:3995 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:342   state:D stack:0     pid:3995  tgid:3995  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9f1d84 r8:00000002 r7:60000113 r6:ea9f1d8c r5:84bf8c00
 r4:84bf8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84bf8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84bf8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df975000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508fb8c r4:8508f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508fb8c r4:8509f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84bf8c00 r8:8509f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509f180 r8:8027ed34 r7:ea9ede60 r6:8509f200 r5:84bf8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f1fb0 to 0xea9f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c4c0
INFO: task kworker/1:342:3995 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: d9638000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:343:3996 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:343   state:D stack:0     pid:3996  tgid:3996  ppid:2      task_flags:0x4208060 flags:0x00000000
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:344:3999 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:344   state:D stack:0     pid:3999  tgid:3999  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:84bfa400
 r4:84bfa400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84bfa400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509c7c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84bfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9df000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8508ff8c r4:8508fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8508ff8c r4:8509f380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84bfa400 r8:8509f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509f380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509f380 r8:8027ed34 r7:ea9f5e60 r6:8509f400 r5:84bfa400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d5fb0 to 0xe06d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c640
INFO: task kworker/1:344:3999 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: db0f2000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:345:4002 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:345   state:D stack:0     pid:4002  tgid:4002  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea965d84 r8:00000002 r7:60000113 r6:ea965d8c r5:84bfb000
 r4:84bfb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84bfb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509ca40
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84bfb000 r8:8509f4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509f480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509f480 r8:8027ed34 r7:ea9f5e60 r6:8509f500 r5:84bfb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea965fb0 to 0xea965ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509c780
INFO: task kworker/1:345:4002 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dced7000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
 r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:346:4003 blocked for more than 464 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea971d84 r8:00000002 r7:60000113 r6:ea971d8c r5:84bfbc00
 r4:84bfbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84bfbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea971e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cc00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84bfbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc83000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85094b8c r4:85094800
 r10:61c88647 r9:84bfbc00 r8:8509f5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:80010013 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:347:4005 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:347   state:D stack:0     pid:4005  tgid:4005  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea999d84 r8:00000002 r7:60000013 r6:ea999d8c r5:84bfc800
 r4:84bfc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84bfc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509cfc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84bfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe09000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8509538c r4:85095000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8509538c r4:8509f700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84bfc800 r8:8509f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509f700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509f700 r8:8027ed34 r7:ea971e60 r6:8509f780 r5:84bfc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea999fb0 to 0xea999ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dd23f000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509ca80
INFO: task kworker/1:348:4006 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dd58a000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:349:4008 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:349   state:D stack:0     pid:4008  tgid:4008  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9f9d84 r8:00000002 r7:60000113 r6:ea9f9d8c r5:84bfe000
 r4:84bfe000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84bfe000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e03c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84bfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff01000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85095f8c r4:85095c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85095f8c r4:8509f880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84bfe000 r8:8509f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509f880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509f880 r8:8027ed34 r7:ea999e60 r6:8509f900 r5:84bfe000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f9fb0 to 0xea9f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509cf00
INFO: task kworker/1:349:4008 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dde41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c38c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84671280
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:350:4013 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:350   state:D stack:0     pid:4013  tgid:4013  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa05d84 r8:00000002 r7:60000113 r6:eaa05d8c r5:850a0000
 r4:850a0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850a0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe49000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8509578c r4:85095400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8509578c r4:8509f980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850a0000 r8:8509f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509f980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509f980 r8:8027ed34 r7:ea9f9e60 r6:8509fa00 r5:850a0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa05fb0 to 0xeaa05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850e0100
INFO: task kworker/1:350:4013 is blocked on a mutex likely owned by task kworker/1:148:3501.
task:kworker/1:148   state:R  running task     stack:0     pid:3501  tgid:3501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84986000 r8:80200be4 r7:e0361d54 r6:ffffffff r5:84986000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xe0361d20 to 0xe0361d68)
1d20: dde41000 e039b000 00000001 80239bb8 7f1cd000 00000001 82abf1c4 82abe5a0
1d40: 7f1cd000 e039b000 8280c9b4 e0361d9c e0361da0 e0361d70 80230af4 80239bd0
1d60: 80010013 ffffffff
 r5:80010013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0361dc0 r5:e0361e08
 r4:e0361dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dca00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec917000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8577c38c r4:8577c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8577c78c r4:84b45700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84986000 r8:84b4572c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84b45700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b45700 r8:8027ed34 r7:e004de60 r6:84b3c980 r5:84986000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0361fb0 to 0xe0361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:353:4017 blocked for more than 464 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:353   state:D stack:0     pid:4017  tgid:4017  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea9fdd84 r8:00000002 r7:60000013 r6:ea9fdd8c r5:850a2400
 r4:850a2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850a2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e07c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8509678c r4:85096400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8509678c r4:8509fc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850a2400 r8:8509fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509fc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8509fc80 r8:8027ed34 r7:eaa01e60 r6:8509fd00 r5:850a2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9fdfb0 to 0xea9fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850e0500
INFO: task kworker/1:353:4017 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 84a45000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0ac0
 r5:00001000 r4:e0409000
 r7:ddde2d40 r6:83018200 r5:85096f8c r4:8509fd80
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850e0640
INFO: task kworker/1:354:4019 is blocked on a mutex likely owned by task kworker/0:51:3517.
 r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:355:4021 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:355   state:D stack:0     pid:4021  tgid:4021  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:850a3c00
 r4:850a3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850a3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:850a3c00 r8:8509feac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8509fe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
 r4:dfe15dc0
 r4:00000000
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:356:4023 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:356   state:D stack:0     pid:4023  tgid:4023  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa15d84 r8:00000002 r7:60000113 r6:eaa15d8c r5:850a4800
 r4:850a4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850a4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:850a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
 r10:61c88647 r9:850a4800 r8:8509ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:357:4025 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:357   state:D stack:0     pid:4025  tgid:4025  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa19d84 r8:00000002 r7:60000113 r6:eaa19d8c r5:850a5400
 r4:850a5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850a5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa19e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e0e40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0443000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8509778c r4:85097400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8509778c r4:850ee080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850a5400 r8:850ee0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850ee080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ee080 r8:8027ed34 r7:eaa15e60 r6:850ee100 r5:850a5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa19fb0 to 0xeaa19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850e0b40
INFO: task kworker/1:357:4025 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 87d92000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:359:4029 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:359   state:D stack:0     pid:4029  tgid:4029  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:850a6c00
 r4:850a6c00
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:e04b1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8510838c r4:85108000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8510838c r4:850ee280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850a6c00 r8:850ee2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850ee280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ee280 r8:8027ed34 r7:eaa1de60 r6:850ee300 r5:850a6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa21fb0 to 0xeaa21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850e0d40
INFO: task kworker/1:359:4029 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 884c4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
 r5:80000013 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r5:00001000 r4:dfa81000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:850a8000
 r4:850a8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850a8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32640
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0490000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:850ee380 r8:8027ed34 r7:eaa21e60 r6:850ee400 r5:850a8000
Exception stack(0xeaa25fb0 to 0xeaa25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32780
INFO: task kworker/1:360:4031 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 88aa9000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:eaa2dd84 r8:00000002 r7:60000113 r6:eaa2dd8c r5:850a8c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8510878c r4:85108400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8510878c r4:850ee480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850a8c00 r8:850ee4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850ee480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ee480 r8:8027ed34 r7:eaa21e60 r6:850ee500 r5:850a8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa2dfb0 to 0xeaa2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509ce80
INFO: task kworker/1:361:4032 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 88e3d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
 r5:84ac8b8c r4:84ac8800
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:362   state:D stack:0     pid:4035  tgid:4035  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:e0565000
 r7:ddde2d40 r6:83018200 r5:85108f8c r4:850ee580
 r10:00000000 r9:850ee580 r8:8027ed34 r7:eaa2de60 r6:850ee600 r5:850a9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa29fb0 to 0xeaa29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850f9040
INFO: task kworker/1:362:4035 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8903a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
 r5:00001000 r4:dfa81000
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:364:4039 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:364   state:D stack:0     pid:4039  tgid:4039  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa39d84 r8:00000002 r7:60000113 r6:eaa39d8c r5:850ab000
 r4:850ab000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850ab000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f92c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e057b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8510938c r4:85109000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:365:4041 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:365   state:D stack:0     pid:4041  tgid:4041  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r7:ddde2d40 r6:83018200 r5:85109b8c r4:850ee800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850abc00 r8:850ee82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850ee800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850ee800 r8:8027ed34 r7:eaa39e60 r6:850ee900 r5:850abc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa3dfb0 to 0xeaa3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850f9440
INFO: task kworker/1:365:4041 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:367:4044 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:367   state:D stack:0     pid:4044  tgid:4044  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa45d84 r8:00000002 r7:60000113 r6:eaa45d8c r5:850ae000
 r4:850ae000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850ae000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9bc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85109f8c r4:85109c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85109f8c r4:850eea80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850ae000 r8:850eeaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850eea80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850eea80 r8:8027ed34 r7:eaa3de60 r6:850eeb00 r5:850ae000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa45fb0 to 0xeaa45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850f9900
INFO: task kworker/1:367:4044 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:368:4048 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:368   state:D stack:0     pid:4048  tgid:4048  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa55d84 r8:00000002 r7:60000013 r6:eaa55d8c r5:84936000
 r4:84936000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84936000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9d00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84936000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0651000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8510a38c r4:8510a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8510a38c r4:850eeb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84936000 r8:850eebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850eeb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850eeb80 r8:8027ed34 r7:eaa45e60 r6:85007300 r5:84936000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa55fb0 to 0xeaa55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850f9a40
INFO: task kworker/1:368:4048 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:dfe15dc0
 r4:00000000
 r5:00001000 r4:dfa81000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:369:4049 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:369   state:D stack:0     pid:4049  tgid:4049  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa41d84 r8:00000002 r7:60000013 r6:eaa41d8c r5:850aec00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:850eec00
Exception stack(0xeaa41fb0 to 0xeaa41ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8be4a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:370:4050 blocked for more than 465 seconds.
 r4:850ac800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:850eed00 r8:8027ed34 r7:eaa41e60 r6:850eed80 r5:850ac800
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8c16b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:371:4053 blocked for more than 465 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:371   state:D stack:0     pid:4053  tgid:4053  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa51d84 r8:00000002 r7:60000113 r6:eaa51d8c r5:850b0c00
 r4:850b0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:00000000 r9:850eee00 r8:8027ed34 r7:eaa41e60 r6:850eee80 r5:850b0c00
Call trace: 
 r4:82abf1e4
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
 r4:00000001
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08
 r5:00001000 r4:e0709000
 r5:8510af8c r4:8510ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8510af8c r4:850eef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84935400 r8:850eef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850eef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850eef00 r8:8027ed34 r7:eaa51e60 r6:85007380 r5:84935400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa5dfb0 to 0xeaa5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08
 r9:83018205 r8:84934800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:374:4060 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:374   state:D stack:0     pid:4060  tgid:4060  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa71d84 r8:00000002 r7:60000013 r6:eaa71d8c r5:84936c00
 r4:84936c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:00001000 r4:e8865000
 r7:ddde2d40 r6:83018200 r5:85110b8c r4:85144000
 r10:00000000 r9:85144000 r8:8027ed34 r7:eaa69e60 r6:85007480 r5:84936c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:375:4061 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:375   state:D stack:0     pid:4061  tgid:4061  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:84930c00
 r4:84930c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84930c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147640
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84930c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47b1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8510bb8c r4:8510b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8510bb8c r4:85144080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84930c00 r8:851440ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144080 r8:8027ed34 r7:eaa71e60 r6:85007500 r5:84930c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa75fb0 to 0xeaa75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85147300
INFO: task kworker/1:375:4061 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 8e3b2000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:376:4063 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:376   state:D stack:0     pid:4063  tgid:4063  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:84bfec00
 r4:84bfec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84bfec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:84bfec00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
 r7:ddde2d40 r6:83018200 r5:8510bf8c r4:85144100
 r10:00000000 r9:85144100 r8:8027ed34 r7:eaa71e60 r6:85007580 r5:84bfec00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdfe15d20 to 0xdfe15d68)
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:377:4065 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:377   state:D stack:0     pid:4065  tgid:4065  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:84933c00
 r4:84933c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84933c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147880
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84933c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8801000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511038c r4:85110000
 r4:85144180
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:378:4067 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:378   state:D stack:0     pid:4067  tgid:4067  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:84931800
 r4:84931800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84931800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851479c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84931800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8831000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511078c r4:85110400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511078c r4:85144200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84931800 r8:8514422c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144200 r8:8027ed34 r7:eaa71e60 r6:85007680 r5:84931800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa8dfb0 to 0xeaa8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85147700
INFO: task kworker/1:378:4067 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 90729000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:eaa91d84 r8:00000002 r7:60000113 r6:eaa91d8c r5:84938000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:85144280 r8:8027ed34 r7:eaa71e60 r6:85007700 r5:84938000
Exception stack(0xeaa91fb0 to 0xeaa91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85147940
INFO: task kworker/1:379:4070 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 90b50000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:380:4071 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:380   state:D stack:0     pid:4071  tgid:4071  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa95d84 r8:00000002 r7:60000113 r6:eaa95d8c r5:84938c00
 r4:84938c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84938c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147c80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84938c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea88b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85110f8c r4:85110c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85110f8c r4:85144300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84938c00 r8:8514432c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144300 r8:8027ed34 r7:eaa91e60 r6:85007780 r5:84938c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa95fb0 to 0xeaa95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85147bc0
INFO: task kworker/1:380:4071 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 90d83000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:381:4073 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:381   state:D stack:0     pid:4073  tgid:4073  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa99d84 r8:00000002 r7:60000113 r6:eaa99d8c r5:84939800
 r4:84939800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84939800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147f80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84939800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea923000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511178c r4:85111400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511178c r4:85144380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84939800 r8:851443ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144380 r8:8027ed34 r7:eaa91e60 r6:85007800 r5:84939800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa99fb0 to 0xeaa99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85147a80
INFO: task kworker/1:381:4073 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 914bb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:382:4075 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:382   state:D stack:0     pid:4075  tgid:4075  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa9dd84 r8:00000002 r7:60000013 r6:eaa9dd8c r5:8493a400
 r4:8493a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8493a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e88c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8493a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea94d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85111b8c r4:85111800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85111b8c r4:85144400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8493a400 r8:8514442c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144400 r8:8027ed34 r7:eaa99e60 r6:85007880 r5:8493a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa9dfb0 to 0xeaa9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85147b00
INFO: task kworker/1:382:4075 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 917bb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:101:4077 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:101   state:D stack:0     pid:4077  tgid:4077  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:8493b000
 r4:8493b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8493b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85153780
 r5:83edc78c r4:83edc400
 r10:61c88647 r9:8493b000 r8:8500792c r7:82804d40 r6:dddced40 r5:dddced60
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
 r4:85153480
INFO: task kworker/0:101:4077 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 91aed000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r5:00001000 r4:dfa81000
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:383:4080 blocked for more than 466 seconds.
 r4:8493bc00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:dfb79000
 r5:8511238c r4:85112000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511238c r4:85144480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8493bc00 r8:851444ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144480 r8:8027ed34 r7:eaa9de60 r6:85007a00 r5:8493bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa61fb0 to 0xeaa61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850e8e40
INFO: task kworker/1:383:4080 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 91c6d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:384:4082 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:384   state:D stack:0     pid:4082  tgid:4082  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ea975d84 r8:00000002 r7:60000113 r6:ea975d8c r5:8493c800
 r4:8493c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8493c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:8511278c r4:85112400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511278c r4:85144500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8493c800 r8:8514452c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144500 r8:8027ed34 r7:eaa61e60 r6:85007a80 r5:8493c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea975fb0 to 0xea975ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85147ec0
INFO: task kworker/1:384:4082 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
task:kworker/0:102   state:D stack:0     pid:4085  tgid:4085  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:8493d400
 r4:8493d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8493d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165bc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8493d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9b3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83edd78c r4:83edd400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83edd78c r4:85007b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8493d400 r8:85007b2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85007b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85007b00 r8:8027ed34 r7:e0391e60 r6:85007b80 r5:8493d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa59fb0 to 0xeaa59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85153700
INFO: task kworker/0:102:4085 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 92097000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8493e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85112f8c r4:85112c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85112f8c r4:85144580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8493e000 r8:851445ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144580 r8:8027ed34 r7:ea975e60 r6:85007c00 r5:8493e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa5fb0 to 0xeaaa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85148280
INFO: task kworker/1:385:4087 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
task:kworker/1:386   state:D stack:0     pid:4088  tgid:4088  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:8493ec00
 r4:8493ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8493ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148500
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8493ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc11000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85112b8c r4:85112800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85112b8c r4:85144600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8493ec00 r8:8514462c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144600 r8:8027ed34 r7:eaaa5e60 r6:85007c80 r5:8493ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa9fb0 to 0xeaaa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85148280
INFO: task kworker/1:386:4088 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 93e67000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r10:829185c4 r9:eaab5d84 r8:00000002 r7:60000113 r6:eaab5d8c r5:84770000
 r4:84770000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84770000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851488c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84770000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd9f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511378c r4:85113400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511378c r4:85144680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84770000 r8:851446ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144680 r8:8027ed34 r7:eaaa5e60 r6:85007d00 r5:84770000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaab5fb0 to 0xeaab5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85148400
INFO: task kworker/1:387:4091 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:388:4092 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
 r5:00001000 r4:dfd55000
 r5:8511338c r4:85113000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xdfe15d20 to 0xdfe15d68)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r5:00001000 r4:dfa81000
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:389:4095 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:389   state:D stack:0     pid:4095  tgid:4095  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaab9d84 r8:00000002 r7:60000113 r6:eaab9d8c r5:850b3000
 r4:850b3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdd5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85113b8c r4:85113800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85113b8c r4:85144800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:85144800
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:390:4098 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:390   state:D stack:0     pid:4098  tgid:4098  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaac9d84 r8:00000002 r7:60000013 r6:eaac9d8c r5:84772400
 r4:84772400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84772400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148b40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84772400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe03000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85113f8c r4:85113c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85113f8c r4:85144900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84772400 r8:8514492c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144900 r8:8027ed34 r7:eaab9e60 r6:85007d80 r5:84772400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaac9fb0 to 0xeaac9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85148880
INFO: task kworker/1:390:4098 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 949e0000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:391:4099 blocked for more than 466 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:391   state:D stack:0     pid:4099  tgid:4099  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaacdd84 r8:00000002 r7:60000013 r6:eaacdd8c r5:84771800
 r4:84771800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84771800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148f80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84771800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffa5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85114b8c r4:85114800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85114b8c r4:85144980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84771800 r8:851449ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144980 r8:8027ed34 r7:eaac9e60 r6:85007e00 r5:84771800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaacdfb0 to 0xeaacdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851489c0
INFO: task kworker/1:391:4099 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 949e0000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:392:4100 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:392   state:D stack:0     pid:4100  tgid:4100  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:850b3c00
 r4:850b3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148c80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff4b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511438c r4:85114000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511438c r4:85144a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850b3c00 r8:85144a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144a00 r8:8027ed34 r7:eaacde60 r6:85144a80 r5:850b3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaabdfb0 to 0xeaabdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851489c0
INFO: task kworker/1:392:4100 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9779c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:393:4103 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:393   state:D stack:0     pid:4103  tgid:4103  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:850b4800
 r4:850b4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148e00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511478c r4:85114400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511478c r4:85144b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850b4800 r8:85144b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144b00 r8:8027ed34 r7:eaacde60 r6:85144b80 r5:850b4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:dfe15dc0
 r4:00000000
 r5:00001000 r4:dfa81000
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:394:4105 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:394   state:D stack:0     pid:4105  tgid:4105  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaad1d84 r8:00000002 r7:60000013 r6:eaad1d8c r5:850b5400
 r4:850b5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b380
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfff1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511538c r4:85115000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511538c r4:85144c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850b5400 r8:85144c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144c00 r8:8027ed34 r7:eaacde60 r6:85144c80 r5:850b5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad1fb0 to 0xeaad1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515b000
INFO: task kworker/1:394:4105 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9900a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:395:4106 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:395   state:D stack:0     pid:4106  tgid:4106  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:850b6000
 r4:850b6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffd1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85114f8c r4:85114c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85114f8c r4:85144d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850b6000 r8:85144d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144d00 r8:8027ed34 r7:eaad1e60 r6:85144d80 r5:850b6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa1fb0 to 0xeaaa1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515b000
INFO: task kworker/1:395:4106 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9900a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:396:4109 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:396   state:D stack:0     pid:4109  tgid:4109  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:850b6c00
 r4:850b6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b4c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e001f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511578c r4:85115400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511578c r4:85144e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850b6c00 r8:85144e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144e00 r8:8027ed34 r7:eaad1e60 r6:85144e80 r5:850b6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad9fb0 to 0xeaad9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515b200
INFO: task kworker/1:396:4109 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 996e8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:397:4111 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:397   state:D stack:0     pid:4111  tgid:4111  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:850b0000
 r4:850b0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b700
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e005b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85115b8c r4:85115800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85115b8c r4:85144f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850b0000 r8:85144f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85144f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85144f00 r8:8027ed34 r7:eaad9e60 r6:85144f80 r5:850b0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaae1fb0 to 0xeaae1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515b340
INFO: task kworker/1:397:4111 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9a6a7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:398:4112 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:398   state:D stack:0     pid:4112  tgid:4112  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaaddd84 r8:00000002 r7:60000113 r6:eaaddd8c r5:850b1800
 r4:850b1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:399:4115 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:399   state:D stack:0     pid:4115  tgid:4115  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaaf1d84 r8:00000002 r7:60000013 r6:eaaf1d8c r5:84773000
 r4:84773000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84773000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b940
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84773000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0525000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511638c r4:85116000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511638c r4:85160100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84773000 r8:8516012c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160100 r8:8027ed34 r7:eaadde60 r6:85007e80 r5:84773000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf1fb0 to 0xeaaf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515b6c0
INFO: task kworker/1:399:4115 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9b471000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:400:4117 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:400   state:D stack:0     pid:4117  tgid:4117  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaaf9d84 r8:00000002 r7:60000013 r6:eaaf9d8c r5:84774800
 r4:84774800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84774800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515bd80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84774800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea989000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85116f8c r4:85116c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85116f8c r4:85160180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84774800 r8:851601ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160180 r8:8027ed34 r7:eaaf1e60 r6:85007f00 r5:84774800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf9fb0 to 0xeaaf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515b740
INFO: task kworker/1:400:4117 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9b7c4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:401:4119 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:401   state:D stack:0     pid:4119  tgid:4119  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab01d84 r8:00000002 r7:60000013 r6:eab01d8c r5:84770c00
 r4:84770c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84770c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515ba80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea945000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511678c r4:85116400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511678c r4:85160200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84770c00 r8:8516022c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160200 r8:8027ed34 r7:eaaf9e60 r6:85007f80 r5:84770c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab01fb0 to 0xeab01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515b9c0
INFO: task kworker/1:401:4119 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9bf85000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:402:4121 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:402   state:D stack:0     pid:4121  tgid:4121  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab05d84 r8:00000002 r7:60000013 r6:eab05d8c r5:84773c00
 r4:84773c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84773c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515bbc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea969000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85116b8c r4:85116800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85116b8c r4:85160280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84773c00 r8:851602ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160280 r8:8027ed34 r7:eaaf9e60 r6:85170000 r5:84773c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab05fb0 to 0xeab05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515ba40
INFO: task kworker/1:402:4121 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9c3df000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:403:4123 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:403   state:D stack:0     pid:4123  tgid:4123  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:84776c00
 r4:84776c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84776c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148d40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab2f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85117b8c r4:85117800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85117b8c r4:85160300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84776c00 r8:8516032c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160300 r8:8027ed34 r7:eaaf9e60 r6:85170080 r5:84776c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab0dfb0 to 0xeab0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515bc00
INFO: task kworker/1:403:4123 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9c79a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:404:4124 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:404   state:D stack:0     pid:4124  tgid:4124  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab11d84 r8:00000002 r7:60000013 r6:eab11d8c r5:84775400
 r4:84775400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84775400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515bec0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84775400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea99f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511738c r4:85117000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511738c r4:85160380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84775400 r8:851603ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160380 r8:8027ed34 r7:eab0de60 r6:85170100 r5:84775400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab11fb0 to 0xeab11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515bc00
INFO: task kworker/1:404:4124 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
5d60: 80000013 ffffffff
 r4:dfe15dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:405:4126 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:405   state:D stack:0     pid:4126  tgid:4126  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab19d84 r8:00000002 r7:60000013 r6:eab19d8c r5:84358c00
 r4:84358c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84358c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32a80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84358c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab1b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8511778c r4:85117400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8511778c r4:85160400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84358c00 r8:8516042c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160400 r8:8027ed34 r7:eab0de60 r6:85170180 r5:84358c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab19fb0 to 0xeab19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515bd40
INFO: task kworker/1:405:4126 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9cf1c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:00000000
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
 r5:84ac8b8c r4:84ac8800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace: 
 r4:84359800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84359800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165f80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84359800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab43000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bec78c r4:84bec400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84bec78c r4:85170200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84359800 r8:8517022c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85170200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170200 r8:8027ed34 r7:e0391e60 r6:85170280 r5:84359800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab15fb0 to 0xeab15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85165a40
INFO: task kworker/0:103:4128 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9ee33000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:84ac8b8c r4:84ac8800
 r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:406:4130 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:406   state:D stack:0     pid:4130  tgid:4130  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaae9d84 r8:00000002 r7:60000013 r6:eaae9d8c r5:850b8c00
 r4:850b8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850b8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851667c0
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fa0:                                     00000000 00000000 00000000 00000000
 r4:00000000
 r4:dfe15dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:104:4131 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:104   state:D stack:0     pid:4131  tgid:4131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaafdd84 r8:00000002 r7:60000113 r6:eaafdd8c r5:8435a400
 r4:8435a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8435a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165e80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bec38c r4:84bec000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84bec38c r4:85170300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8435a400 r8:8517032c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85170300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170300 r8:8027ed34 r7:eab15e60 r6:85170380 r5:8435a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaafdfb0 to 0xeaafdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85165b80
INFO: task kworker/0:104:4131 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:407   state:D stack:0     pid:4135  tgid:4135  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:829185c4 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:850b8000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851665c0
 r9:83018205 r8:850b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab6b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85117f8c r4:85117c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85117f8c r4:85160580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850b8000 r8:851605ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160580 r8:8027ed34 r7:eaae9e60 r6:85160600 r5:850b8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab4dfb0 to 0xeab4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850f9f40
INFO: task kworker/1:407:4135 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: 9eec4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:105:4137 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:105   state:D stack:0     pid:4137  tgid:4137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:850bb000
 r4:850bb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850bb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165680
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:850bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84becb8c r4:84bec800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84becb8c r4:85170400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850bb000 r8:8517042c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85170400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170400 r8:8027ed34 r7:eab15e60 r6:85160680 r5:850bb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab5dfb0 to 0xeab5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85165d80
INFO: task kworker/0:105:4137 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:00000000
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:106:4138 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:106   state:D stack:0     pid:4138  tgid:4138  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab65d84 r8:00000002 r7:60000113 r6:eab65d8c r5:850bbc00
 r4:850bbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850bbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c980
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:850bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0387000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bed78c r4:84bed400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84bed78c r4:85170480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850bbc00 r8:851704ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:85170480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170480 r8:8027ed34 r7:eab5de60 r6:85160700 r5:850bbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab65fb0 to 0xeab65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85165f40
INFO: task kworker/0:106:4138 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a0ed3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:107:4140 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:107   state:D stack:0     pid:4140  tgid:4140  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:850ba400
 r4:850ba400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850ba400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ca80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:850ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe7d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bed38c r4:84bed000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84bed38c r4:85170500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850ba400 r8:8517052c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85170500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170500 r8:8027ed34 r7:eab65e60 r6:85170580 r5:850ba400
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:408:4142 blocked for more than 467 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:408   state:D stack:0     pid:4142  tgid:4142  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab41d84 r8:00000002 r7:60000013 r6:eab41d8c r5:8435bc00
 r4:8435bc00
 r5:8435bc00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:85160780 r8:8027ed34 r7:eaae9e60 r6:85170600 r5:8435bc00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r5:00001000 r4:dfa81000
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:409:4145 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:409   state:D stack:0     pid:4145  tgid:4145  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:8435d400
 r4:8435d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8435d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166cc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8435d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabbf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512178c r4:85121400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512178c r4:85160800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8435d400 r8:8516082c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160800 r8:8027ed34 r7:eaae9e60 r6:85170680 r5:8435d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab8dfb0 to 0xeab8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85166680
INFO: task kworker/1:409:4145 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:410:4146 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:410   state:D stack:0     pid:4146  tgid:4146  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:8435c800
 r4:8435c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8435c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166940
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8435c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab93000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85120b8c r4:85120800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85120b8c r4:85160880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8435c800 r8:851608ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160880 r8:8027ed34 r7:eab8de60 r6:85170700 r5:8435c800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:411:4148 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:411   state:D stack:0     pid:4148  tgid:4148  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:85160900
Exception stack(0xeaba1fb0 to 0xeaba1ff8)
 r4:85166740
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r5:80000013 r4:80239bd0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r5:00001000 r4:dfa81000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:412:4151 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:412   state:D stack:0     pid:4151  tgid:4151  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:8435e000
 r4:8435e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8435e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166bc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8435e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabaf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512138c r4:85121000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512138c r4:85160980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8435e000 r8:851609ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160980 r8:8027ed34 r7:eab8de60 r6:85170800 r5:8435e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabbdfb0 to 0xeabbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851668c0
INFO: task kworker/1:412:4151 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a1ef7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:413   state:D stack:0     pid:4153  tgid:4153  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:829185c4 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:8435ec00
 r4:8435ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8435ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166f40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8435ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabd7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85121f8c r4:85121c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85121f8c r4:85160a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8435ec00 r8:85160a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160a00 r8:8027ed34 r7:eab8de60 r6:85170880 r5:8435ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc9fb0 to 0xeabc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85166a40
INFO: task kworker/1:413:4153 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r5:80000013 r4:80239bd0
 r4:dfe15dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:414:4154 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:414   state:D stack:0     pid:4154  tgid:4154  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000113 r6:eabcdd8c r5:84358000
 r4:84358000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84358000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166f00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84358000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabcf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d40 r6:83018200 r5:85121b8c r4:85160a80
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:415:4157 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:415   state:D stack:0     pid:4157  tgid:4157  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:84776000
 r4:84776000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84776000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165000
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84776000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabf7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512278c r4:85122400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:dfa81000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:416:4158 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:416   state:D stack:0     pid:4158  tgid:4158  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:84870000
 r4:84870000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84870000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84870000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabdf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512238c r4:85122000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512238c r4:85160b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84870000 r8:85160bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160b80 r8:8027ed34 r7:eabe5e60 r6:85170a00 r5:84870000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabedfb0 to 0xeabedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85166f80
INFO: task kworker/1:416:4158 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a3211000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:417:4160 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:417   state:D stack:0     pid:4160  tgid:4160  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabf5d84 r8:00000002 r7:60000013 r6:eabf5d8c r5:84871800
 r4:84871800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84871800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84871800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df989000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85122f8c r4:85122c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85122f8c r4:85160c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84871800 r8:85160c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160c00 r8:8027ed34 r7:eabe5e60 r6:85170a80 r5:84871800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf5fb0 to 0xeabf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85166a40
INFO: task kworker/1:417:4160 is blocked on a mutex likely owned by task kworker/0:51:3517.
Workqueue: events bpf_prog_free_deferred
 r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:dfe15dc0
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:84ac8b8c r4:84ac8800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:418   state:D stack:0     pid:4163  tgid:4163  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:84870c00
 r4:84870c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84870c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166e00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84870c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac03000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85122b8c r4:85122800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85122b8c r4:85160c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84870c00 r8:85160cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160c80 r8:8027ed34 r7:eabf5e60 r6:85170b00 r5:84870c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac19fb0 to 0xeac19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85166240
INFO: task kworker/1:418:4163 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a36a3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:419:4165 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:419   state:D stack:0     pid:4165  tgid:4165  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:829185c4 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:84873c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d8c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe31000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85123f8c r4:85123c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85123f8c r4:85160d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84873c00 r8:85160d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160d00 r8:8027ed34 r7:eabf5e60 r6:85170b80 r5:84873c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac1dfb0 to 0xeac1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509d080
INFO: task kworker/1:419:4165 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a50c9000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:420:4166 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:420   state:D stack:0     pid:4166  tgid:4166  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac21d84 r8:00000002 r7:60000013 r6:eac21d8c r5:84873000
 r4:84873000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84873000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d340
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84873000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa07000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512338c r4:85123000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512338c r4:85160d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:85160d80 r8:8027ed34 r7:eac1de60 r6:85170c00 r5:84873000
 r4:8509d100
Workqueue: events bpf_prog_free_deferred
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
 r5:00001000 r4:dfa81000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:421:4168 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:421   state:D stack:0     pid:4168  tgid:4168  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac25d84 r8:00000002 r7:60000113 r6:eac25d8c r5:84874800
 r4:84874800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84874800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84874800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaad000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512378c r4:85123400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512378c r4:85160e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84874800 r8:85160e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160e00 r8:8027ed34 r7:eac1de60 r6:85170c80 r5:84874800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac25fb0 to 0xeac25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509d3c0
INFO: task kworker/1:421:4168 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a5ac1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:422:4170 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850be000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb3d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85123b8c r4:85123800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85123b8c r4:85160e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850be000 r8:85160eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160e80 r8:8027ed34 r7:eac1de60 r6:85160f00 r5:850be000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa6dfb0 to 0xeaa6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509d4c0
INFO: task kworker/1:422:4170 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a6caf000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:423:4172 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:423   state:D stack:0     pid:4172  tgid:4172  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac29d84 r8:00000002 r7:60000113 r6:eac29d8c r5:850bd400
 r4:850bd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850bd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509dc40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03c1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512438c r4:85124000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512438c r4:85160f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850bd400 r8:85160fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:85160f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85160f80 r8:8027ed34 r7:eac1de60 r6:84673000 r5:850bd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac29fb0 to 0xeac29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509d3c0
INFO: task kworker/1:423:4172 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: a70bd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:424:4175 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:424   state:D stack:0     pid:4175  tgid:4175  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:850bc800
 r4:850bc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850bc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509dd80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03e5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512478c r4:85124400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512478c r4:84673080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850bc800 r8:846730ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673080 r8:8027ed34 r7:eac29e60 r6:84673100 r5:850bc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac31fb0 to 0xeac31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:8509d680
INFO: task kworker/1:424:4175 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r4:00000000
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r5:84bedb8c r4:84bed800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84bedb8c r4:85170d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84876000 r8:85170d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85170d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170d00 r8:8027ed34 r7:eab65e60 r6:85170d80 r5:84876000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab2dfb0 to 0xeab2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516ca00
INFO: task kworker/0:108:4178 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:829185c4 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:84876c00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846beb00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84876c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead0b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85138b8c r4:85138800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85138b8c r4:85170e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84876c00 r8:85170e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85170e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85170e00 r8:8027ed34 r7:eab2de60 r6:85170e80 r5:84876c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac2dfb0 to 0xeac2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8516ca00
INFO: task kworker/0:109:4179 is blocked on a mutex likely owned by task kworker/0:51:3517.
 r4:00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:8509dac0
Workqueue: events bpf_prog_free_deferred
 r4:82abf1e4
 r4:00000000
 r5:84ac8b8c r4:84ac8800
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:426:4184 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:426   state:D stack:0     pid:4184  tgid:4184  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:84858000
 r4:84858000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84858000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32b00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84858000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e04e1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85125b8c r4:85125800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85125b8c r4:84673200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84858000 r8:8467322c r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
 r4:82abf1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:427:4185 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:427   state:D stack:0     pid:4185  tgid:4185  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac51d84 r8:00000002 r7:60000113 r6:eac51d8c r5:84859800
 r4:84859800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84859800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509df80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84859800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0437000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85124f8c r4:85124c00
 r10:61c88647 r9:84859800 r8:846732ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xeac51fb0 to 0xeac51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509dec0
INFO: task kworker/1:427:4185 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r5:00001000 r4:dfa81000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:428:4188 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:428   state:D stack:0     pid:4188  tgid:4188  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:84858c00
 r4:84858c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84858c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509d800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84858c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e045b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:84673300 r8:8027ed34 r7:eac4de60 r6:84b46080 r5:84858c00
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
task:kworker/1:429   state:D stack:0     pid:4189  tgid:4189  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:00001000 r4:e0497000
 r4:00000001
 r4:8509df00
 r4:00000000
 r4:dfe15dc0
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:430:4192 blocked for more than 468 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:430   state:D stack:0     pid:4192  tgid:4192  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac69d84 r8:00000002 r7:60000013 r6:eac69d8c r5:8485b000
 r4:8485b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8485b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c500
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8485b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0585000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512678c r4:85126400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512678c r4:84673400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8485b000 r8:8467342c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673400 r8:8027ed34 r7:eac4de60 r6:84b46180 r5:8485b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac69fb0 to 0xeac69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8509d680
INFO: task kworker/1:430:4192 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: aaa76000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r4:00000000
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:431:4193 blocked for more than 468 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c180
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0539000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85125f8c r4:85125c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85125f8c r4:84673480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xeac59fb0 to 0xeac59ff8)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:84b3cc00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08
 r4:00000000
 r10:61c88647 r9:850bec00 r8:846735ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673580 r8:8027ed34 r7:eac69e60 r6:84673600 r5:850bec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac6dfb0 to 0xeac6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502c000
INFO: task kworker/1:432:4196 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ab0d1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08
 r4:00000000
 r10:61c88647 r9:850c0000 r8:846736ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:00000000
 r4:00000000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85126f8c r4:85126c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85126f8c r4:84673780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c0c00 r8:846737ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673780 r8:8027ed34 r7:eac3de60 r6:84673800 r5:850c0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac71fb0 to 0xeac71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502c4c0
INFO: task kworker/1:434:4200 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ab2b8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
 r4:84b3cc00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08
 r9:83018205 r8:850c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
task:kworker/1:436   state:D stack:0     pid:4203  tgid:4203  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac75fb0 to 0xeac75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502c540
INFO: task kworker/1:436:4203 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ab5a8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08
 r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:850c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06a1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512778c r4:85127400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512778c r4:84673a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c3000 r8:84673aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673a80 r8:8027ed34 r7:eac79e60 r6:84673b00 r5:850c3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac7dfb0 to 0xeac7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502cac0
INFO: task kworker/1:437:4206 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ad80f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:438:4208 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:438   state:D stack:0     pid:4208  tgid:4208  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:850c3c00
 r4:850c3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850c3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509da00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47cf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512c78c r4:8512c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512c78c r4:84673b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c3c00 r8:84673bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673b80 r8:8027ed34 r7:eac79e60 r6:84673c00 r5:850c3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac85fb0 to 0xeac85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502c980
INFO: task kworker/1:438:4208 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ada08000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:439:4210 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:439   state:D stack:0     pid:4210  tgid:4210  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:850c4800
 r4:850c4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850c4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502cd80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0719000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85127f8c r4:85127c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85127f8c r4:84673c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c4800 r8:84673cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673c80 r8:8027ed34 r7:eac85e60 r6:84673d00 r5:850c4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac89fb0 to 0xeac89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502ccc0
INFO: task kworker/1:439:4210 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: adcb3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502cf00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e075f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512c38c r4:8512c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512c38c r4:84673e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c5400 r8:84673e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673e00 r8:8027ed34 r7:eac85e60 r6:84673e80 r5:850c5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac81fb0 to 0xeac81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502cf00
INFO: task kworker/1:440:4211 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ae1e7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:441:4215 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:441   state:D stack:0     pid:4215  tgid:4215  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:850c6000
 r4:850c6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850c6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47fb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512cb8c r4:8512c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512cb8c r4:84673d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c6000 r8:84673dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673d80 r8:8027ed34 r7:eac85e60 r6:84673f00 r5:850c6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac8dfb0 to 0xeac8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2f000
INFO: task kworker/1:441:4215 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ae46d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:442:4216 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:442   state:D stack:0     pid:4216  tgid:4216  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:850c6c00
 r4:850c6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850c6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f380
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8825000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512cf8c r4:8512cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512cf8c r4:84673f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c6c00 r8:84673fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84673f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84673f80 r8:8027ed34 r7:eac8de60 r6:84a6a000 r5:850c6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac95fb0 to 0xeac95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2f000
INFO: task kworker/1:442:4216 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: aeca2000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:443:4219 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:443   state:D stack:0     pid:4219  tgid:4219  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:850c8000
 r4:850c8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850c8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f4c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8871000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512d38c r4:8512d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512d38c r4:84a6a080
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2f200
INFO: task kworker/1:443:4219 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: aef50000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08
 r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r5:00001000 r4:ea8ff000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512db8c r4:84a6a180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850c8c00 r8:84a6a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6a180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6a180 r8:8027ed34 r7:eac99e60 r6:84a6a200 r5:850c8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac9dfb0 to 0xeac9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2f340
INFO: task kworker/1:444:4220 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: af750000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:445:4221 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:445   state:D stack:0     pid:4221  tgid:4221  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac91d84 r8:00000002 r7:60000013 r6:eac91d8c r5:850c9800
 r4:850c9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850c9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f6c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea895000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512d78c r4:8512d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512d78c r4:84a6a300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r4:84a6a300
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
5d60: 80000013 ffffffff
 r4:82abf1e4
 r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:446:4224 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:446   state:D stack:0     pid:4224  tgid:4224  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:850ca400
 r4:850ca400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850ca400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f940
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:447:4226 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:447   state:D stack:0     pid:4226  tgid:4226  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaca9d84 r8:00000002 r7:60000013 r6:eaca9d8c r5:850cb000
 r4:850cb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850cb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2fc80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa4d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512e78c r4:8512e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512e78c r4:84a6a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850cb000 r8:84a6a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6a480 r8:8027ed34 r7:eaca1e60 r6:84a6a500 r5:850cb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca9fb0 to 0xeaca9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2f740
INFO: task kworker/1:447:4226 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b030d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:448:4227 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:448   state:D stack:0     pid:4227  tgid:4227  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eacb1d84 r8:00000002 r7:60000113 r6:eacb1d8c r5:850cbc00
 r4:850cbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850cbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2fb00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512e38c r4:8512e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512e38c r4:84a6a580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850cbc00 r8:84a6a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6a580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6a580 r8:8027ed34 r7:eaca9e60 r6:84a6a600 r5:850cbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb1fb0 to 0xeacb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2fa40
INFO: task kworker/1:448:4227 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b04dd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:449:4230 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:449   state:D stack:0     pid:4230  tgid:4230  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eacb5d84 r8:00000002 r7:60000113 r6:eacb5d8c r5:850cc800
 r4:850cc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850cc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502ce00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac0d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512ef8c r4:8512ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512ef8c r4:84a6a680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850cc800 r8:84a6a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r10:00000000 r9:84a6a680 r8:8027ed34 r7:eaca9e60 r6:84a6a700 r5:850cc800
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2fa80
INFO: task kworker/1:449:4230 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b13e8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:450:4232 blocked for more than 469 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:450   state:D stack:0     pid:4232  tgid:4232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:850cd400
 r4:850cd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850cd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2fdc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa79000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512eb8c r4:8512e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512eb8c r4:84a6a780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850cd400 r8:84a6a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6a780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6a780 r8:8027ed34 r7:eacb5e60 r6:84a6a800 r5:850cd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb9fb0 to 0xeacb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b2fc40
INFO: task kworker/1:450:4232 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b27af000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:8473bd40
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:84b3cc00
 r4:8473bd40
 r4:850cec00
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be600
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84a6a980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6a980 r8:8027ed34 r7:eaca5e60 r6:84a6aa00 r5:850cec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacbdfb0 to 0xeacbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846be000
INFO: task kworker/1:452:4236 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b2dea000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:453:4237 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:453   state:D stack:0     pid:4237  tgid:4237  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eacc5d84 r8:00000002 r7:60000113 r6:eacc5d8c r5:851b0000
 r4:851b0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851b0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512f78c r4:8512f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512f78c r4:84a6aa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b0000 r8:84a6aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6aa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6aa80 r8:8027ed34 r7:eacbde60 r6:84a6ab00 r5:851b0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacc5fb0 to 0xeacc5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846be240
INFO: task kworker/1:453:4237 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b3303000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
INFO: task kworker/1:454:4239 blocked for more than 470 seconds.
Call trace: 
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacdf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8512fb8c r4:8512f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8512fb8c r4:84a6ab80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b0c00 r8:84a6abac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6ab80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6ab80 r8:8027ed34 r7:eacbde60 r6:84a6ac00 r5:851b0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacd1fb0 to 0xeacd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846be180
INFO: task kworker/1:454:4239 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b3672000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:455   state:D stack:0     pid:4242  tgid:4242  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846be900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead03000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513878c r4:85138400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513878c r4:84a6ac80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b1800 r8:84a6acac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6ac80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6ac80 r8:8027ed34 r7:eacbde60 r6:84a6ad00 r5:851b1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace9fb0 to 0xeace9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846be400
INFO: task kworker/1:455:4242 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:dfe15dc0
 r5:00001000 r4:dfa81000
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
INFO: task kworker/1:456:4243 blocked for more than 470 seconds.
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xeacf5fb0 to 0xeacf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846be400
INFO: task kworker/1:456:4243 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b3fac000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
5d20: b42db000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:458:4247 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:458   state:D stack:0     pid:4247  tgid:4247  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:851b4800
 r4:851b4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851b4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bef80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead27000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85138f8c r4:85138c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85138f8c r4:84a6af80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b4800 r8:84a6afac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:84a6af80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84a6af80 r8:8027ed34 r7:eacdde60 r6:8467e000 r5:851b4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead49fb0 to 0xead49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846bea40
INFO: task kworker/1:458:4247 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b4581000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:110:4249 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:110   state:D stack:0     pid:4249  tgid:4249  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead55d84 r8:00000002 r7:60000113 r6:ead55d8c r5:851b6000
 r4:851b6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851b6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846794c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:851b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead77000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84bedf8c r4:84bedc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84bedf8c r4:84b46200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b6000 r8:84b4622c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b46200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b46200 r8:8027ed34 r7:eab2de60 r6:8467e080 r5:851b6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead55fb0 to 0xead55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84679180
INFO: task kworker/0:110:4249 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b49ce000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:459:4252 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:459   state:D stack:0     pid:4252  tgid:4252  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead51d84 r8:00000002 r7:60000113 r6:ead51d8c r5:851b5400
 r4:851b5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851b5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bec00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead5f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513938c r4:85139000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513938c r4:8467e100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b5400 r8:8467e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467e100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467e100 r8:8027ed34 r7:eacdde60 r6:8467e180 r5:851b5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead51fb0 to 0xead51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846beec0
INFO: task kworker/1:459:4252 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b4e0d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:460:4253 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:460   state:D stack:0     pid:4253  tgid:4253  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:851b6c00
 r4:851b6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851b6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502e780
 r9:83018205 r8:851b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:84b3cc00
 r4:8473bd40
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b46280 r8:8027ed34 r7:ead55e60 r6:8467e300 r5:850d8c00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b526d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8473bd40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:850d9800
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84679900
 r7:dddced40 r6:83018000 r5:84bee78c r4:84b46300
 r4:84b46300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b46300 r8:8027ed34 r7:ead95e60 r6:8467e380 r5:850d9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada1fb0 to 0xeada1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84679340
INFO: task kworker/0:112:4257 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b526d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:461:4259 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:461   state:D stack:0     pid:4259  tgid:4259  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadadd84 r8:00000002 r7:60000013 r6:eadadd8c r5:850d8000
 r4:850d8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850d8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84679640
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8467e400 r8:8027ed34 r7:ead01e60 r6:8467e480 r5:850d8000
 r4:8502e1c0
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b57d3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:00000000 r9:8467e500 r8:8027ed34 r7:ead01e60 r6:8467e580 r5:850db000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead91fb0 to 0xead91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502e4c0
INFO: task kworker/1:462:4262 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b5f9d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:463:4263 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:463   state:D stack:0     pid:4263  tgid:4263  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:850dbc00
 r4:850dbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850dbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502e600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85139f8c r4:85139c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85139f8c r4:8467e600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850dbc00 r8:8467e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467e600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467e600 r8:8027ed34 r7:ead01e60 r6:8467e680 r5:850dbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead81fb0 to 0xead81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502e440
INFO: task kworker/1:463:4263 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdfe15d20 to 0xdfe15d68)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:464:4266 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadcdd84 r8:00000002 r7:60000013 r6:eadcdd8c r5:850de000
 r4:850de000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850de000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502e6c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850de000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdab000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513af8c r4:8513ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513af8c r4:8467e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850de000 r8:8467e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467e800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467e800 r8:8027ed34 r7:eadc1e60 r6:8467e880 r5:850de000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadcdfb0 to 0xeadcdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502e4c0
INFO: task kworker/1:465:4267 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b726c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:113:4270 blocked for more than 470 seconds.
Call trace: 
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:84b46380
Exception stack(0xeab09fb0 to 0xeab09ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Exception stack(0xdfe15d20 to 0xdfe15d68)
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:114:4272 blocked for more than 470 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08
 r10:61c88647 r9:851b3000 r8:84b4642c r7:82804d40 r6:dddced40 r5:dddced60
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:8473bd40
 r5:8485ec00 r4:829185c0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:00000000 r9:84b46480 r8:8027ed34 r7:ead95e60 r6:84b46500 r5:8485ec00
Exception stack(0xdfe15d20 to 0xdfe15d68)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:466:4276 blocked for more than 470 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:466   state:D stack:0     pid:4276  tgid:4276  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:8485d400
 r4:8485d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8485d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32c40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8485d400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdf3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513b38c r4:8513b000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513b38c r4:8467ea00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8485d400 r8:8467ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467ea00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467ea00 r8:8027ed34 r7:eadcde60 r6:84b46580 r5:8485d400
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:00001000 r4:dfa81000
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r7:ddde2d40 r6:83018200 r5:8520838c r4:8467ea80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8485e000 r8:8467eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467ea80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467ea80 r8:8027ed34 r7:eaaade60 r6:84b46600 r5:8485e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab51fb0 to 0xeab51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8502ea00
INFO: task kworker/1:467:4278 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
 r4:00000000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
INFO: task kworker/1:468:4280 blocked for more than 471 seconds.
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08
 r5:00001000 r4:dff3b000
 r4:00000001
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
task:kworker/0:116   state:D stack:0     pid:4283  tgid:4283  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r10:61c88647 r9:8485a400 r8:84b4672c r7:82804d40 r6:dddced40 r5:dddced60
Call trace: 
 r4:82abf1e4
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:117:4285 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:117   state:D stack:0     pid:4285  tgid:4285  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:8487b000
 r4:8487b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8487b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08
 r5:84bef78c r4:84bef400
9fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:118:4287 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:118   state:D stack:0     pid:4287  tgid:4287  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab85d84 r8:00000002 r7:60000113 r6:eab85d8c r5:84875400
 r4:84875400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r10:61c88647 r9:84875400 r8:84b4692c r7:82804d40 r6:dddced40 r5:dddced60
 r10:00000000 r9:84b46900 r8:8027ed34 r7:ead95e60 r6:84b46980 r5:84875400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab85fb0 to 0xeab85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84679180
INFO: task kworker/0:118:4287 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: b9eb8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:469:4288 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:469   state:D stack:0     pid:4288  tgid:4288  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab7dd84 r8:00000002 r7:60000013 r6:eab7dd8c r5:84868000
 r4:84868000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84868000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012640
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84868000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e036b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8513bf8c r4:8513bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8513bf8c r4:8467eb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84868000 r8:8467ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467eb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467eb80 r8:8027ed34 r7:eab51e60 r6:84b46a00 r5:84868000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab7dfb0 to 0xeab7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85012240
INFO: task kworker/1:469:4288 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ba309000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:119:4290 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:119   state:D stack:0     pid:4290  tgid:4290  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:84868c00
 r4:84868c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84868c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846b8400
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea94f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84beff8c r4:84befc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84beff8c r4:84b46a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84868c00 r8:84b46aac r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b46a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b46a80 r8:8027ed34 r7:eab85e60 r6:84b46b00 r5:84868c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab9dfb0 to 0xeab9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846796c0
INFO: task kworker/0:119:4290 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ba309000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:470:4293 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:470   state:D stack:0     pid:4293  tgid:4293  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:84869800
 r4:84869800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84869800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9af000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520878c r4:85208400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520878c r4:8467ec00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84869800 r8:8467ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467ec00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467ec00 r8:8027ed34 r7:eab51e60 r6:84b46b80 r5:84869800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb9fb0 to 0xeabb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85012580
INFO: task kworker/1:470:4293 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bab78000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:120:4295 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:120   state:D stack:0     pid:4295  tgid:4295  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eabb5d84 r8:00000002 r7:60000113 r6:eabb5d8c r5:8486b000
 r4:8486b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8486b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846b8680
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8486b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea98f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:83eddb8c r4:83edd800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:83eddb8c r4:84b46c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8486b000 r8:84b46c2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b46c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b46c00 r8:8027ed34 r7:eab85e60 r6:84b46c80 r5:8486b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb5fb0 to 0xeabb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846b8300
INFO: task kworker/0:120:4295 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bab78000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:121:4298 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:121   state:D stack:0     pid:4298  tgid:4298  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:8486bc00
 r4:8486bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8486bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179b80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8486bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03b7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520bf8c r4:8520bc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520bf8c r4:84b46d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8486bc00 r8:84b46d2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b46d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b46d00 r8:8027ed34 r7:eabb5e60 r6:84b46d80 r5:8486bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba9fb0 to 0xeaba9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846b8480
INFO: task kworker/0:121:4298 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bb275000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:122:4299 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:122   state:D stack:0     pid:4299  tgid:4299  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:8486c800
 r4:8486c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8486c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846b8900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8486c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabc1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520ab8c r4:8520a800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8520ab8c r4:84b46e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8486c800 r8:84b46e2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b46e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b46e00 r8:8027ed34 r7:eaba9e60 r6:84b46e80 r5:8486c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab99fb0 to 0xeab99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:846b8480
INFO: task kworker/0:122:4299 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bb275000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:471:4301 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:471   state:D stack:0     pid:4301  tgid:4301  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:8486e000
 r4:8486e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8486e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012ac0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8486e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaaf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85208b8c r4:85208800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85208b8c r4:8467ec80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8486e000 r8:8467ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467ec80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467ec80 r8:8027ed34 r7:eabb9e60 r6:84b46f00 r5:8486e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd1fb0 to 0xeadd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85012980
INFO: task kworker/1:471:4301 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bb700000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r5:85208f8c r4:85208c00
 r10:00000000 r9:8467ed00 r8:8027ed34 r7:eadd1e60 r6:84b46f80 r5:8486a400
 r4:85012940
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bbb3f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:473:4305 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:473   state:D stack:0     pid:4305  tgid:4305  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:84918000
 r4:84918000
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012f40
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeade1fb0 to 0xeade1ff8)
 r4:85012a40
INFO: task kworker/1:473:4305 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bbf17000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:474:4306 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:474   state:D stack:0     pid:4306  tgid:4306  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:84918c00
 r4:84918c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84918c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012dc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84918c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaf3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520938c r4:85209000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520938c r4:8467ee00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84918c00 r8:8467ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467ee00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467ee00 r8:8027ed34 r7:eade1e60 r6:84940080 r5:84918c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade5fb0 to 0xeade5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85012d00
INFO: task kworker/1:474:4306 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bc24f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:475:4308 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:475   state:D stack:0     pid:4308  tgid:4308  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadedd84 r8:00000002 r7:60000113 r6:eadedd8c r5:8491a400
 r4:8491a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8491a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32cc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8491a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab71000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520a38c r4:8520a000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520a38c r4:8467ee80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8491a400 r8:8467eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467ee80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467ee80 r8:8027ed34 r7:eade1e60 r6:84940100 r5:8491a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadedfb0 to 0xeadedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85012d40
INFO: task kworker/1:475:4308 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bc9a8000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:476:4310 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:476   state:D stack:0     pid:4310  tgid:4310  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadf5d84 r8:00000002 r7:60000113 r6:eadf5d8c r5:84919800
 r4:84919800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84919800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012740
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84919800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab35000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85209b8c r4:85209800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85209b8c r4:8467ef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84919800 r8:8467ef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8467ef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8467ef00 r8:8027ed34 r7:eadede60 r6:84940180 r5:84919800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf5fb0 to 0xeadf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85012cc0
INFO: task kworker/1:476:4310 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bcc88000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:477   state:D stack:0     pid:4312  tgid:4312  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:85012cc0
INFO: task kworker/1:477:4312 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bd238000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
      Not tainted 6.16.0-rc2-syzkaller #0
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8491bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfed1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520bb8c r4:8520b800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520bb8c r4:8500e000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8491bc00 r8:8500e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e000 r8:8027ed34 r7:eadede60 r6:84940280 r5:8491bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae05fb0 to 0xeae05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:478:4314 is blocked on a mutex likely owned by task kworker/0:51:3517.
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:479   state:D stack:0     pid:4316  tgid:4316  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851790c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8491c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab89000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520a78c r4:8520a400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520a78c r4:8500e080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8491c800 r8:8500e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e080 r8:8027ed34 r7:eae05e60 r6:84940300 r5:8491c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae0dfb0 to 0xeae0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32ac0
INFO: task kworker/1:479:4316 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bdd63000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179580
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8491d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa23000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520af8c r4:8520ac00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520af8c r4:8500e100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8491d400 r8:8500e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e100 r8:8027ed34 r7:eae05e60 r6:84940380 r5:8491d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae15fb0 to 0xeae15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179000
INFO: task kworker/1:480:4318 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be052000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
Exception stack(0xeae11fb0 to 0xeae11ff8)
INFO: task kworker/0:123:4320 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be2ae000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
INFO: task kworker/0:124:4323 blocked for more than 471 seconds.
Call trace: 
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeabc5fb0 to 0xeabc5ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85001080
INFO: task kworker/0:124:4323 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be6ac000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:481   state:D stack:0     pid:4325  tgid:4325  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:85179480
INFO: task kworker/1:481:4325 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be966000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:482:4328 blocked for more than 471 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:482   state:D stack:0     pid:4328  tgid:4328  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:829185c4 r9:eac35d84 r8:00000002 r7:60000113 r6:eac35d8c r5:851b8000
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:85179680
INFO: task kworker/1:482:4328 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: be966000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:483:4331 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:483   state:D stack:0     pid:4331  tgid:4331  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eacd9d84 r8:00000002 r7:60000113 r6:eacd9d8c r5:851b8c00
 r4:851b8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851b8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179e00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0421000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520c78c r4:8520c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520c78c r4:8500e280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b8c00 r8:8500e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e280 r8:8027ed34 r7:eae05e60 r6:84940700 r5:851b8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacd9fb0 to 0xeacd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179780
INFO: task kworker/1:483:4331 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bf6a5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:8473bd40
      Not tainted 6.16.0-rc2-syzkaller #0
Call trace: 
 r5:851ba400 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179cc0
 r5:00001000 r4:e03f3000
 r5:8520c38c r4:8520c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179780
INFO: task kworker/1:484:4332 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bfa9f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
 r4:8473bd40
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:851b9800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08
 r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851b9800 r8:8494082c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84940800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84940800 r8:8027ed34 r7:eaba9e60 r6:84940880 r5:851b9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacf1fb0 to 0xeacf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85001540
INFO: task kworker/0:125:4334 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: bfdf5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:84b3cc00
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:485:4336 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:485   state:D stack:0     pid:4336  tgid:4336  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead65d84 r8:00000002 r7:60000113 r6:ead65d8c r5:851bc800
 r4:851bc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851bc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179fc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:486:4338 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:486   state:D stack:0     pid:4338  tgid:4338  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:851bbc00
 r4:851bbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851bbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a32dc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e055d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520d38c r4:8520d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520d38c r4:8500e400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851bbc00 r8:8500e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e400 r8:8027ed34 r7:ead65e60 r6:84940980 r5:851bbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead9dfb0 to 0xead9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179c80
INFO: task kworker/1:486:4338 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
Exception stack(0xdfe15d20 to 0xdfe15d68)
 r4:dfe15dc0
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.16.0-rc2-syzkaller #0
 r10:829185c4 r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:851be000
 r4:851be000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851be000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001cc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0451000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85184f8c r4:85184c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85184f8c r4:84940a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851be000 r8:84940a2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:85001b40
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdfe15d20 to 0xdfe15d68)
 r4:82abf1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:487:4342 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:487   state:D stack:0     pid:4342  tgid:4342  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:851bec00
 r4:851bec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851bec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179240
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e052f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520cf8c r4:8520cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520cf8c r4:8500e480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851bec00 r8:8500e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e480 r8:8027ed34 r7:ead9de60 r6:84940b00 r5:851bec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadc9fb0 to 0xeadc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
5d60: 80000013 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
      Not tainted 6.16.0-rc2-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08
 r4:00000000
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84940b80 r8:8027ed34 r7:eacf1e60 r6:84940c00 r5:8486ec00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:488:4345 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:488   state:D stack:0     pid:4345  tgid:4345  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae21d84 r8:00000002 r7:60000113 r6:eae21d8c r5:851bb000
 r4:851bb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851bb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019a80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8859000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520f78c r4:8520f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520f78c r4:8500e500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851bb000 r8:8500e52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e500 r8:8027ed34 r7:ead9de60 r6:84940c80 r5:851bb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae21fb0 to 0xeae21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85179180
INFO: task kworker/1:488:4345 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c070b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:489:4347 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:489   state:D stack:0     pid:4347  tgid:4347  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae29d84 r8:00000002 r7:60000013 r6:eae29d8c r5:847f8c00
 r4:847f8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179200
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0593000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520d78c r4:8520d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520d78c r4:8500e580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f8c00 r8:8500e5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e580 r8:8027ed34 r7:eae21e60 r6:84940d00 r5:847f8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae29fb0 to 0xeae29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a32f80
INFO: task kworker/1:489:4347 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c070b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:490:4349 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:490   state:D stack:0     pid:4349  tgid:4349  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae31d84 r8:00000002 r7:60000113 r6:eae31d8c r5:847fa400
 r4:847fa400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fa400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850190c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05cb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520db8c r4:8520d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520db8c r4:8500e600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fa400 r8:8500e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e600 r8:8027ed34 r7:eae21e60 r6:84940d80 r5:847fa400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae31fb0 to 0xeae31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019080
INFO: task kworker/1:490:4349 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c070b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:491:4351 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:491   state:D stack:0     pid:4351  tgid:4351  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae39d84 r8:00000002 r7:60000013 r6:eae39d8c r5:847f9800
 r4:847f9800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f9800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850192c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e065d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520df8c r4:8520dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520df8c r4:8500e680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f9800 r8:8500e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e680 r8:8027ed34 r7:eae21e60 r6:84940e00 r5:847f9800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae39fb0 to 0xeae39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019200
INFO: task kworker/1:491:4351 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c0c6d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:492:4353 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:492   state:D stack:0     pid:4353  tgid:4353  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae41d84 r8:00000002 r7:60000113 r6:eae41d8c r5:847fc800
 r4:847fc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019440
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06a5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520e38c r4:8520e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520e38c r4:8500e700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fc800 r8:8500e72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e700 r8:8027ed34 r7:eae21e60 r6:84940e80 r5:847fc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae41fb0 to 0xeae41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019140
INFO: task kworker/1:492:4353 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c0c6d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:493:4355 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:493   state:D stack:0     pid:4355  tgid:4355  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:847fbc00
 r4:847fbc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fbc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019540
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06dd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520e78c r4:8520e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520e78c r4:8500e780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fbc00 r8:8500e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e780 r8:8027ed34 r7:eae21e60 r6:84940f00 r5:847fbc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae49fb0 to 0xeae49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019480
INFO: task kworker/1:493:4355 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c148f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:494:4357 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:494   state:D stack:0     pid:4357  tgid:4357  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:847fb000
 r4:847fb000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fb000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019700
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e074d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520eb8c r4:8520e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520eb8c r4:8500e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fb000 r8:8500e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e800 r8:8027ed34 r7:eae21e60 r6:84940f80 r5:847fb000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae51fb0 to 0xeae51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019340
INFO: task kworker/1:494:4357 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c1d8f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:495:4359 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:495   state:D stack:0     pid:4359  tgid:4359  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae59d84 r8:00000002 r7:60000113 r6:eae59d8c r5:847fd400
 r4:847fd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47d1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520ef8c r4:8520ec00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520ef8c r4:8500e880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fd400 r8:8500e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e880 r8:8027ed34 r7:eae21e60 r6:851e9000 r5:847fd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae59fb0 to 0xeae59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019580
INFO: task kworker/1:495:4359 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c20bd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:496:4361 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:496   state:D stack:0     pid:4361  tgid:4361  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae61d84 r8:00000002 r7:60000113 r6:eae61d8c r5:847fe000
 r4:847fe000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fe000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019940
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8809000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520f38c r4:8520f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520f38c r4:8500e900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fe000 r8:8500e92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e900 r8:8027ed34 r7:eae21e60 r6:851e9080 r5:847fe000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae61fb0 to 0xeae61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019600
INFO: task kworker/1:496:4361 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c20bd000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:497:4363 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:497   state:D stack:0     pid:4363  tgid:4363  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae69d84 r8:00000002 r7:60000013 r6:eae69d8c r5:847fec00
 r4:847fec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847fec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae69e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019bc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea897000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520fb8c r4:8520f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520fb8c r4:8500e980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847fec00 r8:8500e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500e980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500e980 r8:8027ed34 r7:eae21e60 r6:851e9100 r5:847fec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae69fb0 to 0xeae69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850197c0
INFO: task kworker/1:497:4363 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2c55000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:498:4366 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:498   state:D stack:0     pid:4366  tgid:4366  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae75d84 r8:00000002 r7:60000113 r6:eae75d8c r5:84758c00
 r4:84758c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84758c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001c00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84758c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85210b8c r4:85210800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85210b8c r4:8500ea00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84758c00 r8:8500ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ea00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ea00 r8:8027ed34 r7:eae69e60 r6:851e9180 r5:84758c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae75fb0 to 0xeae75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019900
INFO: task kworker/1:498:4366 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2c55000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:499:4368 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:499   state:D stack:0     pid:4368  tgid:4368  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae7dd84 r8:00000002 r7:60000113 r6:eae7dd8c r5:8475a400
 r4:8475a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8475a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019cc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8475a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea91f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8520ff8c r4:8520fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8520ff8c r4:8500ea80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8475a400 r8:8500eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ea80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ea80 r8:8027ed34 r7:eae75e60 r6:851e9200 r5:8475a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019c00
INFO: task kworker/1:499:4368 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2f82000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:500:4369 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:500   state:D stack:0     pid:4369  tgid:4369  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae81d84 r8:00000002 r7:60000113 r6:eae81d8c r5:84758000
 r4:84758000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84758000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019e40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84758000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea93d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521038c r4:85210000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521038c r4:8500eb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84758000 r8:8500eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500eb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500eb00 r8:8027ed34 r7:eae75e60 r6:851e9280 r5:84758000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae81fb0 to 0xeae81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019ac0
INFO: task kworker/1:500:4369 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c2f82000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:501:4371 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:501   state:D stack:0     pid:4371  tgid:4371  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae89d84 r8:00000002 r7:60000013 r6:eae89d8c r5:84759800
 r4:84759800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84759800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019f40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84759800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521078c r4:85210400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521078c r4:8500eb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84759800 r8:8500ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500eb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500eb80 r8:8027ed34 r7:eae75e60 r6:851e9300 r5:84759800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae89fb0 to 0xeae89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85019e80
INFO: task kworker/1:501:4371 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c359d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:502:4373 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:502   state:D stack:0     pid:4373  tgid:4373  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:8475b000
 r4:8475b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8475b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8475b000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9d3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521178c r4:85211400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521178c r4:8500ec00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8475b000 r8:8500ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ec00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ec00 r8:8027ed34 r7:eae75e60 r6:851e9380 r5:8475b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae91fb0 to 0xeae91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85001e80
INFO: task kworker/1:502:4373 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c359d000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:503:4375 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:503   state:D stack:0     pid:4375  tgid:4375  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:850dc800
 r4:850dc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850dc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f53c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac37000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521138c r4:85211000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521138c r4:8500ec80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850dc800 r8:8500ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ec80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ec80 r8:8027ed34 r7:eae91e60 r6:8500ed00 r5:850dc800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae85fb0 to 0xeae85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85001e80
INFO: task kworker/1:503:4375 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4235000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:128:4377 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:128   state:D stack:0     pid:4377  tgid:4377  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae99d84 r8:00000002 r7:60000113 r6:eae99d8c r5:851e1800
 r4:851e1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530a040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:851e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85187b8c r4:85187800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85187b8c r4:851e9400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e1800 r8:851e942c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851e9400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851e9400 r8:8027ed34 r7:eacf1e60 r6:851e9480 r5:851e1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae99fb0 to 0xeae99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b4be80
INFO: task kworker/0:128:4377 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4235000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:129:4379 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:129   state:D stack:0     pid:4379  tgid:4379  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:8475c800
 r4:8475c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8475c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84682480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8475c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e001b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8518578c r4:85185400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8518578c r4:851e9500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8475c800 r8:851e952c r7:82804d40 r6:dddced40 r5:dddced60
 r4:851e9500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851e9500 r8:8027ed34 r7:eae99e60 r6:851e9580 r5:8475c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac09fb0 to 0xeac09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b4be80
INFO: task kworker/0:129:4379 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c48eb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:504:4382 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:504   state:D stack:0     pid:4382  tgid:4382  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae09d84 r8:00000002 r7:60000013 r6:eae09d8c r5:8475ec00
 r4:8475ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8475ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f55c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8475ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb87000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85211b8c r4:85211800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85211b8c r4:8500ed80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8475ec00 r8:8500edac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ed80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ed80 r8:8027ed34 r7:eae91e60 r6:851e9600 r5:8475ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae09fb0 to 0xeae09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5340
INFO: task kworker/1:504:4382 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c48eb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:505:4384 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:505   state:D stack:0     pid:4384  tgid:4384  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:8475e000
 r4:8475e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8475e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5c40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8475e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff7f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85212f8c r4:85212c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85212f8c r4:8500ee00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8475e000 r8:8500ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ee00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ee00 r8:8027ed34 r7:eae09e60 r6:851e9680 r5:8475e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaea1fb0 to 0xeaea1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5440
INFO: task kworker/1:505:4384 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4c99000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:506:4385 blocked for more than 472 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:506   state:D stack:0     pid:4385  tgid:4385  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaea5d84 r8:00000002 r7:60000113 r6:eaea5d8c r5:8475bc00
 r4:8475bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8475bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5440
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8475bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbe7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85211f8c r4:85211c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85211f8c r4:8500ee80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8475bc00 r8:8500eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ee80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ee80 r8:8027ed34 r7:eaea1e60 r6:851e9700 r5:8475bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaea5fb0 to 0xeaea5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5440
INFO: task kworker/1:506:4385 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c4f41000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:507:4387 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:507   state:D stack:0     pid:4387  tgid:4387  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:847f8000
 r4:847f8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847f8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5880
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc75000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521238c r4:85212000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521238c r4:8500ef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847f8000 r8:8500ef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ef00 r8:8027ed34 r7:eaea1e60 r6:851e9780 r5:847f8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeadfb0 to 0xeaeadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5600
INFO: task kworker/1:507:4387 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c5206000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:508:4389 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:508   state:D stack:0     pid:4389  tgid:4389  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaeb5d84 r8:00000002 r7:60000013 r6:eaeb5d8c r5:847e0000
 r4:847e0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f59c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdb7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521278c r4:85212400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521278c r4:8500ef80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e0000 r8:8500efac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8500ef80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8500ef80 r8:8027ed34 r7:eaea1e60 r6:851e9800 r5:847e0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeb5fb0 to 0xeaeb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5780
INFO: task kworker/1:508:4389 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c5542000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:509:4391 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:509   state:D stack:0     pid:4391  tgid:4391  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaebdd84 r8:00000002 r7:60000113 r6:eaebdd8c r5:847e1800
 r4:847e1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5ac0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff2b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85212b8c r4:85212800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85212b8c r4:851f9000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e1800 r8:851f902c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9000 r8:8027ed34 r7:eaea1e60 r6:851e9880 r5:847e1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaebdfb0 to 0xeaebdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5840
INFO: task kworker/1:509:4391 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c566e000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:510:4393 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:510   state:D stack:0     pid:4393  tgid:4393  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:847e3000
 r4:847e3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5fc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0369000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521378c r4:85213400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521378c r4:851f9080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e3000 r8:851f90ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9080 r8:8027ed34 r7:eaea1e60 r6:851e9900 r5:847e3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaec5fb0 to 0xeaec5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5980
INFO: task kworker/1:510:4393 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c59e0000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:511:4395 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:511   state:D stack:0     pid:4395  tgid:4395  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:847e2400
 r4:847e2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5bc0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e881b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85213b8c r4:85213800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85213b8c r4:851f9100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e2400 r8:851f912c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9100 r8:8027ed34 r7:eaec5e60 r6:851e9980 r5:847e2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaecdfb0 to 0xeaecdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5a00
INFO: task kworker/1:511:4395 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c5d77000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:512:4399 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:512   state:D stack:0     pid:4399  tgid:4399  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaec9d84 r8:00000002 r7:60000013 r6:eaec9d8c r5:847e3c00
 r4:847e3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b100
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea98b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521438c r4:85214000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521438c r4:851f9180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e3c00 r8:851f91ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9180 r8:8027ed34 r7:eaecde60 r6:851e9a00 r5:847e3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaec9fb0 to 0xeaec9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5040
INFO: task kworker/1:512:4399 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c6db3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:513:4402 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:513   state:D stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:847e6000
 r4:847e6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5e40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea95f000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85213f8c r4:85213c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85213f8c r4:851f9200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e6000 r8:851f922c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9200 r8:8027ed34 r7:eaec9e60 r6:851e9a80 r5:847e6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed5fb0 to 0xeaed5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851f5040
INFO: task kworker/1:513:4402 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c6db3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:514:4404 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:514   state:D stack:0     pid:4404  tgid:4404  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaed9d84 r8:00000002 r7:60000113 r6:eaed9d8c r5:847e4800
 r4:847e4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaabf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85214b8c r4:85214800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85214b8c r4:851f9280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e4800 r8:851f92ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9280 r8:8027ed34 r7:eaec9e60 r6:851e9b00 r5:847e4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed9fb0 to 0xeaed9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84b4b080
INFO: task kworker/1:514:4404 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c6f65000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:130:4405 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:130   state:D stack:0     pid:4405  tgid:4405  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaeddd84 r8:00000002 r7:60000113 r6:eaeddd8c r5:847e6c00
 r4:847e6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e62c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:847e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521c78c r4:8521c400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:8521c78c r4:851e9b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e6c00 r8:851e9bac r7:82804d40 r6:dddced40 r5:dddced60
 r4:851e9b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851e9b80 r8:8027ed34 r7:eae99e60 r6:851e9c00 r5:847e6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeddfb0 to 0xeaeddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84682680
INFO: task kworker/0:130:4405 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c76ba000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:515:4406 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:515   state:D stack:0     pid:4406  tgid:4406  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:851e3000
 r4:851e3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a570c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea9b5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521478c r4:85214400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521478c r4:851f9300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e3000 r8:851f932c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9300 r8:8027ed34 r7:eaed9e60 r6:851f9380 r5:851e3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed1fb0 to 0xeaed1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57000
INFO: task kworker/1:515:4406 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7bf6000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:516:4409 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:516   state:D stack:0     pid:4409  tgid:4409  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eac01d84 r8:00000002 r7:60000013 r6:eac01d8c r5:851e3c00
 r4:851e3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaae5000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85214f8c r4:85214c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85214f8c r4:851f9400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e3c00 r8:851f942c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9400 r8:8027ed34 r7:eaed9e60 r6:851f9480 r5:851e3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac01fb0 to 0xeac01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57240
INFO: task kworker/1:516:4409 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7fd4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:517:4411 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:517   state:D stack:0     pid:4411  tgid:4411  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaee1d84 r8:00000002 r7:60000113 r6:eaee1d8c r5:851e4800
 r4:851e4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab61000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85215b8c r4:85215800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85215b8c r4:851f9500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e4800 r8:851f952c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9500 r8:8027ed34 r7:eac01e60 r6:851f9580 r5:851e4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee1fb0 to 0xeaee1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57280
INFO: task kworker/1:517:4411 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7fd4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:518:4412 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:518   state:D stack:0     pid:4412  tgid:4412  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae95d84 r8:00000002 r7:60000013 r6:eae95d8c r5:851e5400
 r4:851e5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a576c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab1d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521538c r4:85215000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521538c r4:851f9600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e5400 r8:851f962c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9600 r8:8027ed34 r7:eaee1e60 r6:851f9680 r5:851e5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae95fb0 to 0xeae95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57280
INFO: task kworker/1:518:4412 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c7fd4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:519:4415 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:519   state:D stack:0     pid:4415  tgid:4415  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:851e6000
 r4:851e6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a577c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab33000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521578c r4:85215400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521578c r4:851f9700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e6000 r8:851f972c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9700 r8:8027ed34 r7:eaee1e60 r6:851f9780 r5:851e6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee9fb0 to 0xeaee9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57540
INFO: task kworker/1:519:4415 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c8529000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:520:4416 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:520   state:D stack:0     pid:4416  tgid:4416  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaeedd84 r8:00000002 r7:60000013 r6:eaeedd8c r5:851e6c00
 r4:851e6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57a80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85215f8c r4:85215c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85215f8c r4:851f9800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e6c00 r8:851f982c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9800 r8:8027ed34 r7:eaee1e60 r6:851f9880 r5:851e6c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeedfb0 to 0xeaeedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57840
INFO: task kworker/1:520:4416 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c8bab000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:521:4419 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:521   state:D stack:0     pid:4419  tgid:4419  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:851e2400
 r4:851e2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851e2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57c40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabb1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521638c r4:85216000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521638c r4:851f9900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851e2400 r8:851f992c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9900 r8:8027ed34 r7:eaeede60 r6:851f9980 r5:851e2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef1fb0 to 0xeaef1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57880
INFO: task kworker/1:521:4419 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c8dd6000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:522:4421 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:522   state:D stack:0     pid:4421  tgid:4421  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:8475d400
 r4:8475d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8475d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57d40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8475d400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabdb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521678c r4:85216400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521678c r4:851f9a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8475d400 r8:851f9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9a00 r8:8027ed34 r7:eaef1e60 r6:851e9c80 r5:8475d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf01fb0 to 0xeaf01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57ac0
INFO: task kworker/1:522:4421 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c91e7000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:523:4423 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:523   state:D stack:0     pid:4423  tgid:4423  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:851bd400
 r4:851bd400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:851bd400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57f00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:851bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac55000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85216b8c r4:85216800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85216b8c r4:851f9a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:851bd400 r8:851f9aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9a80 r8:8027ed34 r7:eaf01e60 r6:851e9d00 r5:851bd400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf09fb0 to 0xeaf09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57c80
INFO: task kworker/1:523:4423 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c9381000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:524:4424 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:524   state:D stack:0     pid:4424  tgid:4424  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf0dd84 r8:00000002 r7:60000013 r6:eaf0dd8c r5:847e0c00
 r4:847e0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b800
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacbf000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85216f8c r4:85216c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85216f8c r4:851f9b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e0c00 r8:851f9b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9b00 r8:8027ed34 r7:eaf09e60 r6:851e9d80 r5:847e0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf0dfb0 to 0xeaf0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57c80
INFO: task kworker/1:524:4424 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c97f5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:525:4426 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:525   state:D stack:0     pid:4426  tgid:4426  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf15d84 r8:00000002 r7:60000113 r6:eaf15d8c r5:84978c00
 r4:84978c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84978c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eace1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521738c r4:85217000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521738c r4:851f9b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84978c00 r8:851f9bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9b80 r8:8027ed34 r7:eaf0de60 r6:851e9e00 r5:84978c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf15fb0 to 0xeaf15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57f80
INFO: task kworker/1:525:4426 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c9b2a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:526:4428 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:526   state:D stack:0     pid:4428  tgid:4428  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:84978000
 r4:84978000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84978000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851675c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84978000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead29000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85217f8c r4:85217c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85217f8c r4:851f9c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84978000 r8:851f9c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9c00 r8:8027ed34 r7:eaf15e60 r6:851e9e80 r5:84978000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf1dfb0 to 0xeaf1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851670c0
INFO: task kworker/1:526:4428 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: c9b2b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:527:4430 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:527   state:D stack:0     pid:4430  tgid:4430  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf25d84 r8:00000002 r7:60000013 r6:eaf25d8c r5:8497b000
 r4:8497b000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8497b000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167300
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8497b000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead07000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521778c r4:85217400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521778c r4:851f9c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8497b000 r8:851f9cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9c80 r8:8027ed34 r7:eaf1de60 r6:851e9f00 r5:8497b000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf25fb0 to 0xeaf25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851670c0
INFO: task kworker/1:527:4430 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ca2d4000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:528:4432 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:528   state:D stack:0     pid:4432  tgid:4432  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf2dd84 r8:00000002 r7:60000113 r6:eaf2dd8c r5:8497a400
 r4:8497a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8497a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf2de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8497a400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead11000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85217b8c r4:85217800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85217b8c r4:851f9d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8497a400 r8:851f9d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9d00 r8:8027ed34 r7:eaf1de60 r6:851e9f80 r5:8497a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf2dfb0 to 0xeaf2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167180
INFO: task kworker/1:528:4432 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ca4b1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:529:4435 blocked for more than 473 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:529   state:D stack:0     pid:4435  tgid:4435  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:8497c800
 r4:8497c800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8497c800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167b40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8497c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadf7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521d38c r4:8521d000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521d38c r4:851f9d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8497c800 r8:851f9dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9d80 r8:8027ed34 r7:eaf1de60 r6:850f8000 r5:8497c800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf35fb0 to 0xeaf35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167400
INFO: task kworker/1:529:4435 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ca714000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:530:4436 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:530   state:D stack:0     pid:4436  tgid:4436  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf39d84 r8:00000002 r7:60000113 r6:eaf39d8c r5:8497d400
 r4:8497d400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8497d400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167700
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead79000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521c38c r4:8521c000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521c38c r4:851f9e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8497d400 r8:851f9e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9e00 r8:8027ed34 r7:eaf35e60 r6:850f8080 r5:8497d400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf39fb0 to 0xeaf39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167400
INFO: task kworker/1:530:4436 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cba42000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:531:4438 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:531   state:D stack:0     pid:4438  tgid:4438  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf41d84 r8:00000002 r7:60000113 r6:eaf41d8c r5:8497bc00
 r4:8497bc00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8497bc00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851678c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadd3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521cb8c r4:8521c800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521cb8c r4:851f9e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8497bc00 r8:851f9eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9e80 r8:8027ed34 r7:eaf35e60 r6:850f8100 r5:8497bc00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf41fb0 to 0xeaf41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:851674c0
INFO: task kworker/1:531:4438 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cc07a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:131:4440 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:131   state:D stack:0     pid:4440  tgid:4440  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:8497e000
 r4:8497e000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8497e000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e6a80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:8497e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e03ff000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85185f8c r4:85185c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85185f8c r4:850f8180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8497e000 r8:850f81ac r7:82804d40 r6:dddced40 r5:dddced60
 r4:850f8180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850f8180 r8:8027ed34 r7:eae99e60 r6:850f8200 r5:8497e000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf3dfb0 to 0xeaf3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850e6000
INFO: task kworker/0:131:4440 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cc182000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:532:4442 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:532   state:D stack:0     pid:4442  tgid:4442  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:847e5400
 r4:847e5400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:847e5400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167a00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:847e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eade7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521cf8c r4:8521cc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521cf8c r4:851f9f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:847e5400 r8:851f9f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9f00 r8:8027ed34 r7:eaf35e60 r6:850f8280 r5:847e5400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf4dfb0 to 0xeaf4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167740
INFO: task kworker/1:532:4442 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ccfc3000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:533:4445 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:533   state:D stack:0     pid:4445  tgid:4445  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf59d84 r8:00000002 r7:60000013 r6:eaf59d8c r5:850f0c00
 r4:850f0c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f0c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167c80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf5b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521d78c r4:8521d400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521d78c r4:851f9f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f0c00 r8:851f9fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:851f9f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f9f80 r8:8027ed34 r7:eaf35e60 r6:850f8300 r5:850f0c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf59fb0 to 0xeaf59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167880
INFO: task kworker/1:533:4445 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cd36b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:534:4447 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:534   state:D stack:0     pid:4447  tgid:4447  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf6dd84 r8:00000002 r7:60000013 r6:eaf6dd8c r5:850f0000
 r4:850f0000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f0000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167f00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf7b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521df8c r4:8521dc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521df8c r4:850e1000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f0000 r8:850e102c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1000 r8:8027ed34 r7:eaf59e60 r6:850f8380 r5:850f0000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf6dfb0 to 0xeaf6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167b00
INFO: task kworker/1:534:4447 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cdb43000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:535:4448 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:535   state:D stack:0     pid:4448  tgid:4448  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf71d84 r8:00000002 r7:60000113 r6:eaf71d8c r5:850f2400
 r4:850f2400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f2400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167b00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf67000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521db8c r4:8521d800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521db8c r4:850e1080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f2400 r8:850e10ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1080 r8:8027ed34 r7:eaf6de60 r6:850f8400 r5:850f2400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf71fb0 to 0xeaf71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167b00
INFO: task kworker/1:535:4448 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cdda5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:536:4450 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:536   state:D stack:0     pid:4450  tgid:4450  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:850f1800
 r4:850f1800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f1800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb4c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa43000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521f38c r4:8521f000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521f38c r4:850e1100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f1800 r8:850e112c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1100 r8:8027ed34 r7:eaf6de60 r6:850f8480 r5:850f1800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf85fb0 to 0xeaf85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85167e40
INFO: task kworker/1:536:4450 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ce1eb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:537:4452 blocked for more than 474 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:537   state:D stack:0     pid:4452  tgid:4452  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eaf95d84 r8:00000002 r7:60000013 r6:eaf95d8c r5:850f3000
 r4:850f3000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f3000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846824c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf8b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521e38c r4:8521e000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521e38c r4:850e1180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f3000 r8:850e11ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1180 r8:8027ed34 r7:eaf85e60 r6:850f8500 r5:850f3000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf95fb0 to 0xeaf95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84682f00
INFO: task kworker/1:537:4452 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: ce68a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:538:4454 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:538   state:D stack:0     pid:4454  tgid:4454  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:850f4800
 r4:850f4800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f4800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a57e00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf97000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521e78c r4:8521e400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521e78c r4:850e1200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f4800 r8:850e122c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1200 r8:8027ed34 r7:eaf85e60 r6:850f8580 r5:850f4800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa1fb0 to 0xeafa1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84a57e80
INFO: task kworker/1:538:4454 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cee1b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:539:4456 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:539   state:D stack:0     pid:4456  tgid:4456  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:850f6000
 r4:850f6000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f6000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafa7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521eb8c r4:8521e800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521eb8c r4:850e1280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f6000 r8:850e12ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1280 r8:8027ed34 r7:eaf85e60 r6:850f8600 r5:850f6000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb1fb0 to 0xeafb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850fb040
INFO: task kworker/1:539:4456 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cf32b000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:540:4458 blocked for more than 475 seconds.
Call trace: 
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:850e1300 r8:8027ed34 r7:eaf85e60 r6:850f8680 r5:850f5400
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
5d60: 80000013 ffffffff
 r4:dfe15dc0
 r4:00000000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:541:4460 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:541   state:D stack:0     pid:4460  tgid:4460  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eae6dd84 r8:00000002 r7:60000113 r6:eae6dd8c r5:850f6c00
 r4:850f6c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f6c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fba80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0447000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522038c r4:85220000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522038c r4:850e1380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f6c00 r8:850e13ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1380
 r10:00000000 r9:850e1380 r8:8027ed34 r7:eaf85e60 r6:850f8700 r5:850f6c00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:00000000
 r5:00001000 r4:dfa81000
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:542:4462 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:542   state:D stack:0     pid:4462  tgid:4462  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:8497ec00
 r4:8497ec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8497ec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb5c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8497ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb17000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521f78c r4:8521f400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521f78c r4:850e1400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8497ec00 r8:850e142c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1400 r8:8027ed34 r7:eae6de60 r6:850f8780 r5:8497ec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850fb200
INFO: task kworker/1:542:4462 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cf7bb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:543:4464 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:543   state:D stack:0     pid:4464  tgid:4464  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:850f3c00
 r4:850f3c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:850f3c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb740
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcfd000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521fb8c r4:8521f800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521fb8c r4:850e1480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:850f3c00 r8:850e14ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1480 r8:8027ed34 r7:eae6de60 r6:850f8800 r5:850f3c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850fb440
INFO: task kworker/1:543:4464 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cf915000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:544:4466 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:544   state:D stack:0     pid:4466  tgid:4466  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:849d8c00
 r4:849d8c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d8c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb780
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfead000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8521ff8c r4:8521fc00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8521ff8c r4:850e1580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d8c00 r8:850e15ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1580 r8:8027ed34 r7:eae6de60 r6:850f8880 r5:849d8c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc9fb0 to 0xeafc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850fb800
INFO: task kworker/1:544:4466 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: cfd21000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:545:4468 blocked for more than 475 seconds.
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fbc80
 r5:85220b8c r4:85220800
 r4:850e1500
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850fb840
INFO: task kworker/1:545:4468 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d0129000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:132:4471 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:132   state:D stack:0     pid:4471  tgid:4471  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafc5d84 r8:00000002 r7:60000113 r6:eafc5d8c r5:849da400
 r4:849da400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849da400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
5d20: d0c0a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:546:4473 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:546   state:D stack:0     pid:4473  tgid:4473  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:849dbc00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08
 r4:00000000
 r5:8522078c r4:85220400
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:547:4476 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:547   state:D stack:0     pid:4476  tgid:4476  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:849dc800
 r4:849dc800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849dc800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f480
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ea931000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85222b8c r4:85222800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe9fb0 to 0xeafe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850fbc40
INFO: task kworker/1:549:4479 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d221f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:84b3cc00
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fbd40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849de000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e067d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522178c r4:85221400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522178c r4:850e1800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849de000 r8:850e182c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1800 r8:8027ed34 r7:eafdde60 r6:850f8c80 r5:849de000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff1fb0 to 0xeaff1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:850fbfc0
INFO: task kworker/1:550:4481 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r5:80000013 r4:80239bd0
 r4:00000000
 r5:00001000 r4:dfa81000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:551:4483 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:551   state:D stack:0     pid:4483  tgid:4483  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:84979800
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:850e1880 r8:8027ed34 r7:eafdde60 r6:850f8d00 r5:84979800
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:552:4486 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:552   state:D stack:0     pid:4486  tgid:4486  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:85250c00
 r4:85250c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85250c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84682b40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85250c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47a7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85221f8c r4:85221c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85221f8c r4:850e1900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85250c00 r8:850e192c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1900 r8:8027ed34 r7:eafdde60 r6:850f8d80 r5:85250c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb00dfb0 to 0xeb00dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84682d40
INFO: task kworker/1:552:4486 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d2fbf000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:553:4487 blocked for more than 475 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:553   state:D stack:0     pid:4487  tgid:4487  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:85251800
 r4:85251800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85251800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f140
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85251800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e47f3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522238c r4:85222000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522238c r4:850e1980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85251800 r8:850e19ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1980 r8:8027ed34 r7:eafdde60 r6:850f8e00 r5:85251800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb011fb0 to 0xeb011ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:84682d40
INFO: task kworker/1:553:4487 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d320a000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
 r5:85250000 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85250000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e884d000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522278c r4:85222400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:85253000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85186b8c r4:85186800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:85186b8c r4:850f8f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85253000 r8:850f8f2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:850f8f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850f8f00 r8:8027ed34 r7:eae99e60 r6:850f8f80 r5:85253000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef5fb0 to 0xeaef5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85174cc0
INFO: task kworker/0:133:4492 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:82abf1e4
 r4:dfe15dc0
 r4:00000000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:555:4494 blocked for more than 476 seconds.
Call trace: 
 r5:85253c00 r4:829185c0
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
 r9:83018205 r8:85253c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
 r7:ddde2d40 r6:83018200 r5:8522338c r4:850e1a80
 r10:00000000 r9:850e1a80 r8:8027ed34 r7:eafdde60 r6:85142000 r5:85253c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515f100
INFO: task kworker/1:555:4494 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d4120000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:556:4495 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:556   state:D stack:0     pid:4495  tgid:4495  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:85254800
 r4:85254800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85254800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f600
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85254800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa4b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85222f8c r4:85222c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85222f8c r4:850e1b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85254800 r8:850e1b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1b00 r8:8027ed34 r7:eb021e60 r6:85142080 r5:85254800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb025fb0 to 0xeb025ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515f100
INFO: task kworker/1:556:4495 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d4120000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:557:4498 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:557   state:D stack:0     pid:4498  tgid:4498  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:85256000
 r4:85256000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85256000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f840
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85256000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabf1000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522378c r4:85223400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522378c r4:850e1b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85256000 r8:850e1bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1b80 r8:8027ed34 r7:eb021e60 r6:85142100 r5:85256000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb02dfb0 to 0xeb02dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515f500
INFO: task kworker/1:557:4498 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:82abf1e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r5:00001000 r4:dfa81000
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:558:4500 blocked for more than 476 seconds.
task:kworker/1:558   state:D stack:0     pid:4500  tgid:4500  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:85252400
 r4:85252400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85252400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275b80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85252400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb10b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85227b8c r4:85227800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85227b8c r4:850e1c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85252400 r8:850e1c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1c00 r8:8027ed34 r7:eb02de60 r6:85142180 r5:85252400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb035fb0 to 0xeb035ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515f6c0
INFO: task kworker/1:558:4500 is blocked on a mutex likely owned by task kworker/0:51:3517.
Workqueue: events bpf_prog_free_deferred
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:559   state:D stack:0     pid:4501  tgid:4501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:85255400
 r4:85255400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85255400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f9c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85255400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac15000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85223b8c r4:85223800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:850e1c80 r8:8027ed34 r7:eb035e60 r6:85142200 r5:85255400
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d4e4f000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:560:4503 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:560   state:D stack:0     pid:4503  tgid:4503  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:849d8000
 r4:849d8000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849d8000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fa80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaccb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85223f8c r4:85223c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85223f8c r4:850e1d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849d8000 r8:850e1d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1d00 r8:8027ed34 r7:eb035e60 r6:85142280 r5:849d8000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb045fb0 to 0xeb045ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515f940
INFO: task kworker/1:560:4503 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d51f5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:561:4505 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:561   state:D stack:0     pid:4505  tgid:4505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:849dec00
 r4:849dec00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:849dec00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fc40
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:849dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead8b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522438c r4:85224000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522438c r4:850e1d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:849dec00 r8:850e1dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1d80 r8:8027ed34 r7:eb035e60 r6:85142300 r5:849dec00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb04dfb0 to 0xeb04dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515f940
INFO: task kworker/1:561:4505 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d5783000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:562:4507 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:562   state:D stack:0     pid:4507  tgid:4507  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb055d84 r8:00000002 r7:60000013 r6:eb055d8c r5:84960c00
 r4:84960c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84960c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fd80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84960c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae17000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522478c r4:85224400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522478c r4:850e1e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84960c00 r8:850e1e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1e00 r8:8027ed34 r7:eb035e60 r6:85142380 r5:84960c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb055fb0 to 0xeb055ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515fac0
INFO: task kworker/1:562:4507 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d5bcb000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:563:4509 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:563   state:D stack:0     pid:4509  tgid:4509  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb061d84 r8:00000002 r7:60000013 r6:eb061d8c r5:84963000
 r4:84963000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84963000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fe80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84963000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae2b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85224b8c r4:85224800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85224b8c r4:850e1e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84963000 r8:850e1eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1e80 r8:8027ed34 r7:eb035e60 r6:85142400 r5:84963000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb061fb0 to 0xeb061ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515fc00
INFO: task kworker/1:563:4509 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d6120000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:564:4511 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:564   state:D stack:0     pid:4511  tgid:4511  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:84961800
 r4:84961800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84961800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515ff00
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84961800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae3b000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85224f8c r4:85224c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85224f8c r4:850e1f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84961800 r8:850e1f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1f00 r8:8027ed34 r7:eb035e60 r6:85142480 r5:84961800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb065fb0 to 0xeb065ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515ff80
INFO: task kworker/1:564:4511 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d8a9c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:565:4513 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:565   state:D stack:0     pid:4513  tgid:4513  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:84962400
 r4:84962400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84962400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85174f80
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84962400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae53000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522538c r4:85225000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522538c r4:850e1f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84962400 r8:850e1fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:850e1f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:850e1f80 r8:8027ed34 r7:eb035e60 r6:85142500 r5:84962400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb06dfb0 to 0xeb06dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515fc80
INFO: task kworker/1:565:4513 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d8c4e000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:566:4515 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:566   state:D stack:0     pid:4515  tgid:4515  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb091d84 r8:00000002 r7:60000013 r6:eb091d8c r5:84960000
 r4:84960000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84960000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f3c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84960000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae63000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522578c r4:85225400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522578c r4:8523f000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84960000 r8:8523f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f000 r8:8027ed34 r7:eb035e60 r6:85142580 r5:84960000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb091fb0 to 0xeb091ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515fe00
INFO: task kworker/1:566:4515 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d8c4e000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:567:4517 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:567   state:D stack:0     pid:4517  tgid:4517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb099d84 r8:00000002 r7:60000013 r6:eb099d8c r5:84963c00
 r4:84963c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84963c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84963c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae77000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85225b8c r4:85225800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85225b8c r4:8523f080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84963c00 r8:8523f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f080 r8:8027ed34 r7:eb035e60 r6:85142600 r5:84963c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb099fb0 to 0xeb099ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8515fe00
INFO: task kworker/1:567:4517 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9499000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:568:4519 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:568   state:D stack:0     pid:4519  tgid:4519  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:84964800
 r4:84964800
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84964800 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275280
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84964800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaff3000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85225f8c r4:85225c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85225f8c r4:8523f100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84964800 r8:8523f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f100 r8:8027ed34 r7:eb035e60 r6:85142680 r5:84964800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a1fb0 to 0xeb0a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852751c0
INFO: task kworker/1:568:4519 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d958c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:569:4521 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:569   state:D stack:0     pid:4521  tgid:4521  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:84965400
 r4:84965400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84965400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275100
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84965400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0ab000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522638c r4:85226000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522638c r4:8523f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84965400 r8:8523f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f180 r8:8027ed34 r7:eb035e60 r6:85142700 r5:84965400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a9fb0 to 0xeb0a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85275100
INFO: task kworker/1:569:4521 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d958c000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:570:4523 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:570   state:D stack:0     pid:4523  tgid:4523  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:84966000
 r4:84966000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84966000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852752c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84966000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0bb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522678c r4:85226400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522678c r4:8523f200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84966000 r8:8523f22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f200 r8:8027ed34 r7:eb035e60 r6:85142780 r5:84966000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b9fb0 to 0xeb0b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852752c0
INFO: task kworker/1:570:4523 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9748000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:571:4525 blocked for more than 476 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:571   state:D stack:0     pid:4525  tgid:4525  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:84966c00
 r4:84966c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:84966c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275680
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:84966c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0c7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85226b8c r4:85226800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85226b8c r4:8523f280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84966c00 r8:8523f2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f280 r8:8027ed34 r7:eb035e60 r6:85142800 r5:84966c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0d1fb0 to 0xeb0d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:852753c0
INFO: task kworker/1:571:4525 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9af1000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:572:4527 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:572   state:D stack:0     pid:4527  tgid:4527  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:85268c00
 r4:85268c00
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85268c00 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852757c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85268c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0d7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85226f8c r4:85226c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85226f8c r4:8523f300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85268c00 r8:8523f32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f300 r8:8027ed34 r7:eb035e60 r6:85142880 r5:85268c00
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e1fb0 to 0xeb0e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85275540
INFO: task kworker/1:572:4527 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: d9b68000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:84ac8b8c r4:84ac8800
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced40 r6:83018000 r5:84ac8b8c r4:84b3cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:84a98000 r8:84b3cc2c r7:82804d40 r6:dddced40 r5:dddced60
 r4:84b3cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:573:4529 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:573   state:D stack:0     pid:4529  tgid:4529  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb0e9d84 r8:00000002 r7:60000113 r6:eb0e9d8c r5:8526a400
 r4:8526a400
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:8526a400 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275900
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:8526a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0eb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522738c r4:85227000
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522738c r4:8523f380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:8526a400 r8:8523f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f380 r8:8027ed34 r7:eb035e60 r6:85142900 r5:8526a400
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e9fb0 to 0xeb0e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85275640
INFO: task kworker/1:573:4529 is blocked on a mutex likely owned by task kworker/0:51:3517.
task:kworker/0:51    state:R  running task     stack:0     pid:3517  tgid:3517  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85275780
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85269800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0fb000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:8522778c r4:85227400
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:8522778c r4:8523f400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85269800 r8:8523f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f400 r8:8027ed34 r7:eb035e60 r6:85142980 r5:85269800
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0f9fb0 to 0xeb0f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:85275780
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r10:00000000 r9:84b3cc00 r8:8027ed34 r7:dffcde60 r6:84b45d00 r5:84a98000
 r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe15fb0 to 0xdfe15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r4:8473bd40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:575:4533 blocked for more than 477 seconds.
      Not tainted 6.16.0-rc2-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:575   state:D stack:0     pid:4533  tgid:4533  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
 r10:829185c4 r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:85268000
 r4:85268000
[<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
 r5:85268000 r4:829185c0
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08
 r4:00000000
[<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f3040
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018205 r8:85268000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbb7000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
 r5:85228f8c r4:85228c00
[<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d40 r6:83018200 r5:85228f8c r4:8523f480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:61c88647 r9:85268000 r8:8523f4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
 r4:8523f480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8523f480 r8:8027ed34 r7:eb035e60 r6:85142a00 r5:85268000
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: da2b5000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08
 r9:83018205 r8:8526b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c9b4 r9:84a98000 r8:80200be4 r7:dfe15d54 r6:ffffffff r5:84a98000
 r4:00000000
[<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdfe15d20 to 0xdfe15d68)
5d20: da919000 ee10d000 00000001 80239bb8 7f1cf000 00000001 82abf1c4 82abe5a0
5d40: 7f1cf000 ee10d000 8280c9b4 dfe15d9c dfe15da0 dfe15d70 80230af4 80239bd0
5d60: 80000013 ffffffff
 r5:80000013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
 r4:82abf1e4
[<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe15dc0 r5:dfe15e08
 r4:dfe15dc0
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a3b0c0
 r4:00000000
[<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
 r9:83018005 r8:84a98000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa81000
[<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free